{"id":693,"date":"2020-01-27T08:02:39","date_gmt":"2020-01-27T15:02:39","guid":{"rendered":"http:\/\/dshsolutions.com\/wordpress\/?p=693"},"modified":"2020-01-27T08:02:39","modified_gmt":"2020-01-27T15:02:39","slug":"3-ways-to-browse-the-web-anonymously-welivesecurity","status":"publish","type":"post","link":"https:\/\/dshsolutions.com\/wordpress\/3-ways-to-browse-the-web-anonymously-welivesecurity\/","title":{"rendered":"3 ways to browse the web anonymously | WeLiveSecurity"},"content":{"rendered":"<blockquote><p>As concern about internet privacy grows and grows, more and more people are actively seeking to browse the web anonymously. There are various ways to avoid being identified or tracked on the internet, although, in fact, \u201cattempt to avoid\u201d might often be more appropriate. Online anonymity can often feel like a fleeting goal, and a problem as complex as online privacy has no solution that is bulletproof under all circumstances.<\/p>\n<p>Besides rather simple options such as proxy services or virtual private networks (VPNs), there are other services that you can use in order to hide your surfing habits from your Internet Service Provider (ISP), government, or the very websites you\u2019re visiting. Let\u2019s look at the benefits and downsides of three easy-to-use anonymity networks \u2013 Tor, I2P, and Freenet.<\/p>\n<p><a href=\"https:\/\/www.welivesecurity.com\/2020\/01\/21\/3-ways-browse-web-anonymously\/?utm_source=newsletter&#038;utm_medium=email&#038;utm_campaign=wls-newsletter-240120\">Read  the article<\/a><\/p><\/blockquote>\n<p>Source: <em><a href=\"https:\/\/www.welivesecurity.com\/2020\/01\/21\/3-ways-browse-web-anonymously\/?utm_source=newsletter&#038;utm_medium=email&#038;utm_campaign=wls-newsletter-240120\">3 ways to browse the web anonymously | WeLiveSecurity<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As concern about internet privacy grows and grows, more and more people are actively seeking to browse the web anonymously. There are various ways to avoid being identified or tracked on the internet, although, in fact, \u201cattempt to avoid\u201d might often be more appropriate. Online anonymity can often feel like a fleeting goal, and a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,4,5,10],"tags":[],"class_list":["post-693","post","type-post","status-publish","format-standard","hentry","category-general-and-non-specific-topics","category-privacy","category-security-2","category-learn-how-to-use-your-softwarehardware"],"_links":{"self":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/comments?post=693"}],"version-history":[{"count":0,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/693\/revisions"}],"wp:attachment":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/media?parent=693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/categories?post=693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/tags?post=693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}