3. How to reduce the traces left behind during navigation
Before discussing solutions, it's important to remember that there's no such thing as perfect anonymity. Moreover, being anonymous on the web doesn't mean you don't have to respect the rules of Internet use, or online intellectual property rights. In the event of an infringement, the judicial authorities may request the identification of the IP address in question, and launch in-depth investigations to try and trace it back to the main user.
3.1 Using the free Tor proxy
Tor (The Onion Router) is a free worldwide network of relays called Onion Routers, communicating via 128-bit AES-encrypted TCP tunnels. When connecting to a site via Tor, an encrypted random path is created between the server and the user. This path uses at least three relays. The IP address...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
How to reduce the traces left behind during navigation
Article included in this offer
"Management and innovation engineering"
(
434 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Websites
Google Analytics is a data analysis service offered by Google. It enables website and mobile app owners to collect information on user behavior, site traffic, traffic sources, conversions and much more.
XITI is a...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!