Anonymized


Overall I don't consider myself an ultra-paranoid computer user, however there are times I like to consider my actions a bit more private and discreet. In the next few blogs I'll look at tools, and features that can help you accomplish private computing.

Using in browser privacy
In all modern browsers privacy can be managed a bit using the built in privacy features. These features are limited, as they only provide browser based anonymity, but they are quick and simple to use. The thing about these features is that they only provide privacy from snooping by the web host (server) at best.

Here are IE (inprivacy), and chrome (incognito) features.







Once the browser session is open browsing is private also, cookies and browser history will  be wiped once the session is closed. However its essential to know your browsing may be private, but if you dig deep there are footprints of the browsing session persevered on the computer. These artifacts can be discovered if the device is investigated forensically. Also it's essential to remember that the ISP you are surfing through will have all the browser information from your system as they had without the feature enabled.

Next blog I'll look at using proxy anonymizers.


Comments

Popular posts from this blog

Protecting sensitive data

Secure workstation - Root of trust to manage the cloud

Why is privileged access important?