The worse place to surf online is on public domain WIFI networks. We share steps on how to remain anonymous online
You are always under observation when you’re surfing the internet. Many entities – such as curious companies, the authorities or intelligence agencies – can find out which sites you’re visiting and who you’re communicating with. The technology itself is to blame - after all, when the internet was being developed, considerations related to data protection was not exactly a high priority.
Everyone knows that if you don’t have an IP address, you can neither communicate over the internet nor access a web address. However, this simple address provides quite a lot of information about you, even if nobody makes the corresponding enquiries with your provider. For example, a simple test can be run to find out where you are currently residing. Several online shops use this information in order to, among other things, assess your creditworthiness. The situation becomes even more precarious when you leave your home network and access the internet through a public hotspot. Under such circumstances, other users can snoop on your data traffic, and launch targeted attacks to try to obtain your password and other data.
In this article, we’re introducing you to various techniques that you can use to surf the internet securely when you’re on the move or at home. For example, a VPN (virtual private network) service such as F-Secure Freedome can offer decent privacy protection.
But a VPN service represents just one of the many ways in which you can protect your privacy. Onion-routing is a way of enhancing the level of surfing security. The following section tells you how to use the individual techniques.
VPN service – F-Secure Freedome
F-Secure’s Freedome is a VPN service that allows you to protect your devices with a simple tap or click of the mouse. There are 17 different server locations to choose from. CHIP’s showing you how to set up the service under iOS, Android, Windows and Mac. Freedome allows all users to test the apps and the desktop software for a period of two weeks.
Setup under Apple iOS
Install the F-Secure Freedome VPN programme from the Apple App Store. When the application is launched for the first time, it asks for permission to install a certificate. This gives the application the right to modify the smartphone’s network settings, and is necessary for establishing a VPN connection. Don’t be alarmed by the message that says that the certificate is not signed. The certificate merely simplifies the installation process, so that you will not have to manually enter the type of encryption and the cipher code.
To activate the VPN, launch the app and tap the large white circle. The iPhone will then display the “VPN” symbol in the upper status field. If you so desire, F-Secure will check the data traffic and block tracking attempts. This complicates attempts to create a surfing profile, which companies can use to generate targeted advertising messages. At the same time, the VPN tool also provides better protection against hack attacks. When the “Browser protection” function is activated, the programme runs a real-time check to determine whether the currently-accessed address is on a blacklist of suspicious sites, and blocks access if necessary.
You can now specify which location you would like to use to surf the internet. F-Secure Freedome lets you choose between 17 different locations. If you would primarily like to use Malaysian internet services, you don’t need to change the default settings. If remaining anonymous is your top priority, you should use the server associated with the “Special Administrative Region of Hong Kong”.
The websites that you access through the VPN allocate you geographically to the country that hosts the VPN server. Consequently, these websites may offer you services that are different from the services that are offered to another visitor – No wonder VPNs are so popular among users who want to use foreign streaming services!
Special functions under Android
Under Android, F-Secure Freedome VPN is to be installed via the Google Play Store. The installation process is, to a large extent, identical to the setup process for the iOS app. However, since programmes on Android devices can have a lot more access rights for the system, this version offers the option of checking the smartphone for programmes that want to tap off your data right from the moment at which the VPN tunnel is established. Consequently, the “App security” option only exists in the Android variant of the software.
After the installation process has been completed, the app requests access to all the network traffic, so that it can encrypt the entire flow of communications. In addition to offering the aforementioned option of scanning for malware, the Android version of F-Secure Freedome VPN also makes it possible to flag secure WLANs. If the smartphone is connected to a wireless network, you can set up direct connections with other devices in this wireless network, which would otherwise not have been possible with a VPN connection. This enables you, for example, to use your smartphone to access a media server in the home network, without having to deactivate the VPN beforehand.
To do this, access the app settings and tap the “Reliable WLAN networks” option. Mark the corresponding networks with tick marks and tap “OK” to confirm. Now, activate the “Launch programme at device start-up” option in the settings section. The app will now be loaded automatically after the device has been rebooted. The rest of the operation corresponds to the operations under iOS. The Android version also allows you to use our premium code to extend the duration of the testing period to six months.
Usage under Windows and Mac OS
The process of installing the programme under the two major desktop operating systems is extremely simple: All you have to do is run the Installer, accept the conditions of use and click “Install”. The major advantage of Freedome: After installation, the software directly integrates itself into the respective operating system, and adjusts the network settings. Consequently, you do not have to change the configuration yourself.
Annonymity Through TOR
A VPN isn’t the only way to surf the internet in a secure manner. Many users also use the free TOR network, which relies on the onion-routing technology. In this case, the protection is based on a combination of encryption and anonymisation of the users. The data packets follow a route – which is selected via a random generator – that runs through multiple TOR nodes, which are basically nothing but stopovers. The TOR client encrypts the packets. Each node only knows the next station – and not the sender and the destination of the data. However, not even the TOR network can offer foolproof protection against snooping attempts. Certain nosy authorities have probably developed the ability to spy on the input and output nodes in particular, but the effort involved is enormous. Consequently, TOR is still a good way to surf the internet in a more secure manner.
Using TOR in conjunction with Windows
The TOR Browser package for Windows is a pre-configured piece of software, which allows you to access the internet directly through the TOR network. It comprises the ESR (extended support release) version of the Firefox browser, which is well-secured through additional plug-ins, and automatically sets up a connection with TOR. To install it, run the EXE file and follow the wizard. As soon as the process has been completed, the system throws up a window, in which you can specify the basic settings. All you have to do is click “Connect”. You will then be greeted with a congratulatory message. Now, click the “Test TOR network settings” option to check whether everything is working properly.
Before you start accessing websites, you should call up the “Privacy and security settings”. This section allows you to check the basic settings. The TOR Browser uses the private mode by default, which means that browsing histories and cookies are not saved locally. Furthermore, plug-ins such as Flash are deactivated. However, the slider for the “Security level” is initially set to “Low” - You should change that. The higher the slider, the more secure your online expeditions. This is accomplished by, among other things, deactivating browser features. For example, if you set the slider to “Lower medium”, HTML5 videos can only be played within the click-to-play framework; the execution of JavaScript is also curtailed. At the “Upper medium” level, the browser completely deactivates JavaScript for HTTP connections. At the “High” level, it also blocks several image files. In practice, “Upper medium” is a good choice.
TOR for Android
Android users can turn to Orbot, which is an official app for the TOR project. If you want to be able to make full use of the complete range of functions, the device should be rooted. However, Orbot can also function without root-access. The app can be installed via the Google Play Store. Launch Orbot and grant it permanent root access. Now, put your finger on the big button for a few seconds to activate TOR. Then, access the Orbot settings and activate the “Request for root access” and “Transparent proxy” options, so that your apps will be able to use the TOR network to access the internet. Furthermore, you can also decide whether all the programmes (“Route everything through Tor”) or just the selected ones (“Select apps”) should use the TOR network. We recommend starting small and adding additional apps later.
TOR for iOS
There is no official TOR app for iOS, but a few third-party programmes are available. For example, the Onion Browser is quite recommendable. It routes the internet access operations conducted by iPhones and iPads through TOR. The programme costs 99 cents, and it’s very easy to use. Simply allow TOR to be used when the app is launched. You can visit the website check.torproject.org to check the connection.