Skip to main content

Questions tagged [anonymity]

The state of being anonymous. Meaning: not identified by name and not having outstanding, individual, or unusual features that enable identification.

2 votes
0 answers
89 views

I'm designing an encrypted traffic system where users can stay anonymous while learning more about networking and security. Anonymity is achieved through layered encryption, where traffic passes ...
Lixt's user avatar
  • 121
3 votes
0 answers
837 views

SimpleX (whitepaper; audited by Trail of Bits) claims to be The first messenger without user IDs Other apps have user IDs: Signal, Matrix, Session, Briar, Jami, Cwtch, etc. SimpleX does not, not even ...
Geremia's user avatar
  • 2,056
1 vote
2 answers
4k views

Yesterday, I was playing a counterstrike game on FACEIT, when all of sudden one of my teammates started bullying me for my bad plays. It was standard trash-talking for a bit, but then all of a sudden, ...
Game Account's user avatar
0 votes
1 answer
184 views

Researching on this topic I found the answer of Conor Mancone for a similar question about whether Can an ISP detect or log specific devices connected to ISP-provided home routers?, which answer was ...
Zyncho's user avatar
  • 101
1 vote
1 answer
361 views

I was considering using passkeys as a 1FA. I wanted users to login/register without email or password and without logging their IP. But being anonymous would probably bring very bad things to any site....
Mike's user avatar
  • 113
1 vote
2 answers
227 views

I know the safest bet If I want to remain anonymous is having 2 separate computers, but I was curious if having 2 OS in different hard drives (both encrypted) but on same computer the same? Is the ...
Elias LP's user avatar
0 votes
2 answers
1k views

my goal is to upload photos such that I preserve anonymity (not so concerned about WHAT is being uploaded, but trying to conceal WHO is doing so). I came up with the idea of taking a screenshot of the ...
Jack 's user avatar
0 votes
0 answers
239 views

It's been known ever since Tor existed that flow correlation attacks can break Tor's anonymity, but whereas in the past flow correlation attacks had a false positive rate far too high to be useful ...
DeepPSNA's user avatar
19 votes
2 answers
9k views

In his talk about OPSEC, The Grugq stresses that you first have to go through TOR before connecting to a VPN. Otherwise, the VPN would be a direct link from the endpoint to you. He summarizes: TOR ...
Arbuiwer's user avatar
  • 191
0 votes
1 answer
1k views

While testing any site using BurpSuite, if we send any request it will use BurpSuite HTTP "Proxying through BurpSuite" but still we are not fully anonymous, it will still use our original ...
Noob Hunter's user avatar
4 votes
2 answers
2k views

A bounty hunter reached out to us to give us information about a security vulnerability in our company's information systems. In our estimation, the risk of exploitation for this vulnerability is ...
SirDeg's user avatar
  • 43
-1 votes
1 answer
241 views

By using hidemy name I can check for a proxy if it is up or down, and also check the anonymity level using the app. A sample result looks like this: IP address Port Country, City Speed ...
C.Unbay's user avatar
  • 217
1 vote
1 answer
138 views

We are using an API from a third party for managing content which is secured by an API key which does not change over time. Now we are building our own API to support part of that functionality. So ...
Wilko van der Veen's user avatar
0 votes
1 answer
489 views

If my main intention is to hide whatever I do on the internet from my ISP, then which VPN connection should I use; TCP or UDP? Or if I need to do anything more for that purpose please tell me. Also ...
Ezio's user avatar
  • 35
0 votes
0 answers
181 views

Buying an international web domain (so there is no national law to expose its details beyond the domain registrar) Not putting any personal and family name in the website What else?
user283460's user avatar

15 30 50 per page
1
2 3 4 5
35