Last updated by The POOG on August 03, 2020.

under construction

This topic is a collection of research on technology  that may either enhance your privacy or reduce it. The main aim is to help you to increase your security, privacy and anonymity in an age when all are increasingly being threatened and taken from you.

Internet Background

A Very Brief History

xxx

Structure of the Internet

xxxthe World Wide Web (WWW) or simply ‘web’, we explained how you communicate with remote sites and services using the http communications protocol. The gory details are hidden in the software such as your internet browser, but at the heart of it is your internet protocol (IP) address.

The Internet Protocol and Addresses

xxx isp dns numeric and alias whois domain reistrar

Message Routing

When you want to connect to or communicate with a remote site, you must have its IP address as described above. You compose a message or comple a trsaaction and press the return or send key or button to send your message.

It first goes to your ISP who can see the entire transaction

The World Wide Web (WWW) and the Dark Web

xxx

the World Wide Web (WWW) or simply ‘web’, we explained how you communicate with remote sites and services using the http communications protocol. The gory details are hidden in the software such as your internet browser, but at the heart of it is your internet protocol (IP) address.

Vulnerabilities

xxx

The Virtual Private Network (VPN)

In this section we present a technology that can enhance your security as well as you anonymity.

Every device that connects to the internet has a unique IP address that among other things identifies your physical location. When Netflix and other streaming media services block transmission of content to your country for whatever reason such as copyright, your IP address identifies your country and you are thereby blocked.

You don’t give out personal information such as telephone number, street address, email address, etc. to everyone automatically without being asked. Yet every time you go online you give certain information to the party at the other end; you’re giving away a degree of privacy.

There is however, a solution to this. It’s called a Virtual Private Network or VPN. There are many companies that offer VPN service on a subscription basis. This is how it works.

The VPN provider has servers in multiple counties – over 90 different countries in a few cases.

When you switch on a VPN, it creates an encrypted ‘tunnel’ between your computer and a server operated by the VPN company. When the operator gets your internet traffic they remove your IP address ad insert one that they control. Your traffic is then sent to its destination. The reply comes back to your VPN operator who reinserts your own address and sends the traffic back to you.

The result is that the site you are communicating with thinks that you are at the VPN operator’s location which could be in Peru Vietnam.

By piping all of your web traffic through this tunnel, your traffic appears as if it is coming from the VPN server rather than your computer—thus hiding your IP address. This makes it much harder for spies, advertisers, and your ISP. It also helps protect against ISPs selling anonymized metadata about your web habits. This protects your real identity as you browse the web.

What to Look for When Shopping for a VPN

https://www.pcmag.com/reviews/surfshark-vpn

The VPN That We Use

How They Track You

This section touches on some of the techniques used to track your location.

Passive Tracking

Active Tracking

Here is one device that can be used to track you. You may asked to carry it voluntarily, An inducement to facilitate this is to connect it to a rewards program that is used to capture information from suckers.