Yes, you can be anonymous online. At least under the right conditions, but it's not necessarily easy. Your daily identity is constantly tracked by accounts that you're signed in to, and by third-party vendors hoping to better target your ads. This means that your favorite browser is usually filled with trackers to keep track of your online activity.
In addition, does he know what's going on with your ISP, other intruders in passive (or active) government data collection, and in all kinds of data? The bottom line is that you need to take specific steps to ensure a degree of anonymity on the internet.
If you only want an anonymous email account that nobody in your business or private life knows, it's not that hard. However, one single mistake is to log in to the email account before securing your connection, or access your non-anonymous identity at the wrong time, and your identity may be revealed.
This tutorial will guide you through the necessary steps, depending on how far you want to go, you can either use all the advice or just read the parts you need. We explain why every step is helpful for your decisions.
: Get an Anonymous Workspace
If you really want to remain anonymous, it's best to have a separate digital workspace just for your secret identity. In this way, there is no risk of overlap between your everyday accountant and your anonymous whistleblowing / Mr. robot identity.
If you set up an account with a regular browser on your day-to-day computer, it's enough for someone to lurk in your PC and oops! Your anonymity.
This is about your anonymity Some options.
Level 1: Install the TOR Browser on a USB stick. If your bets are fairly low (that is, if your account is detected, this is not the end of the world), it will suffice if you run TOR from a USB drive. The TOR Browser is a version of Firefox that connects to the Onion Router (TOR) network. This system forwards your Internet connection through multiple nodes (computers) before switching to the open internet. Using TOR obscures your actual IP address. In addition, by default, the TOR browser does not save your browsing history, so your activity is kept secret. To keep the TOR as safe as possible, read Tor's tips on how to stay as secure and private on the Internet as possible.
For more information, see our tutorial in the TOR Browser .
Level 2: More advanced users can run an entire operating system, such as: For example, the Linux distribution for privacy. This is like a completely separate computer without a second physical device. Again, it's about setting a firewall between your real identity and your anonymous account.
Level 3: If you are extremely paranoid or are found out, this means a non-life-threatening disaster-discrete laptop used only for your secret identity. You should pay for your device, preferably in cash or with a disposable Visa gift card, to avoid the laptop being reconnected to your office. On the laptop an encrypted Linux variant should be executed. However, if you need to use Windows 10, make sure that you enable your computer with a local account. Disable all possible tracking methods during the setup. Do not use Cortana. Do not install unnecessary software on this device and do not log on in your normal life. The idea is to have as little additional information as possible on this laptop. Additional applications and mixing your anonymous life with your actual life are a big "no". Do not forget to put a tape or sheet of paper over your webcam. It's extremely paranoid, but even Mark Zuckerberg does.
Step 2: Location, Location, Location
You never want to access your secret identity from home or work. This is a bad idea, as it is possible to specify an Internet Protocol (IP) address that could be traced back to you. In order to find this, you would have to do some advanced anger, but to be anonymous you have to make sure nobody knows where you really are. Keep your anonymous activity in a local café, library, or other location where public Wi-Fi is available. If you're really paranoid, it's probably a good idea to pick a location that's not too close to your everyday location.
For the super paranoids: Another important note is that other devices you use can give you away too. To keep things as separate as possible, leave your phone at home or at least turn it off and remove the battery (if possible).
Step 3: Use TOR or a VPN (but not really)  Once you have a place where you can not work at home or at work, from where you can send your e-mails, it is Time to connect to the internet. But wait! Before doing this, you must use either the TOR network or a high-quality VPN.
If you are already using the TOR Browser via a USB stick, skip this part as you are already doing so. For all others, we still recommend using TOR, not VPNs, because the TOR network is so beautiful you do not have to trust anyone. TOR works by running your encrypted connection across multiple servers before exiting the open network. That way, it's much harder to track you back to your actual location, and only the last server you put on the Internet can spy on your activity-except for unforeseen exploits-that is.
If a VPN is a better option for you, however, choose a VPN that accepts cash, has a long track record in defending user rights, and still uses TOR .  Seriously, TOR is your best anonymity guardian for using a secret email account – if you pay with a credit card for your VPN, you're traceable, if somehow the VPN is forced to prosecute you, they are all endangered as well, although these are all worst-case scenarios, but the principle is important Keep as anonymous as possible, use TOR.
But TOR is not a magic bullet in itself. "By default, the TOR browser uses the browser extension HTTPS of the Electronic Frontier Foundation Your connection over SSL / TLS between the exit node and the website you want to visit. That should be enough to keep potential snoops out of your company.
Note that when using the TOR browser, only this app is connected to the TOR network. If you use the Spotify desktop app to stream music at the same time, this will not happen through TOR.
Step 4: Create an E-Mail Account
There are tons of anonymous e-mail options, such as Guerrilla Mail and Secure-Email.org. We'll talk a little bit about that, but we'll assume you need a default email address with an inbox, a folder sent, and the rest.
We recommend the use of ProtonMail. This is one of the few known e-mail services that you can use without specifying a backup ID such as a phone number or a secondary e-mail. In addition, ProtonMail is encrypted by default, and there is a TOR-accessible version of its website at https://protonirockerxow.onion/, which makes it a good choice.
Step 5: Go on and remember these tips
If you're connected through TOR in a separate workspace and your email address is set up, it's time to receive messaging. When writing emails, be careful not to say anything that might reveal your actual identity, and do not connect to anything in your real life in your anonymous setup.
It is also a good idea to save the username and password for your anonymous user's email account. Do not put it in the password manager that is part of your normal life, do not put down notes on your laptop that may fall off, and never use your ProtonMail username and password elsewhere.
If you need a lesson, why is this so important. Read how law enforcement agencies catch up with Silk Road founder Ross Ulbricht. It all started with an unknown user name that Ulbricht had used years ago and that was related to his real identity. Remember, all you need is a single slip-up to undo all your steps to protect your privacy. Also, do not start a digital black market dedicated to the sale of drugs and weapons – this only calls for trouble.
Bonus Section: Anonymous E-mail Services
If you only need to send a single anonymous e-mail, then you must meet the conditions are different. First, you do not necessarily want to use a secondary laptop. Let's say you use the TOR browser on a USB stick, but you still can not connect from home or office.
What then? Visit GuerillaMail.com. You will receive a temporary one-way e-mail address that is forever valid. Anyone can send an e-mail message to this address, but the messages will only stay in the Inbox for one hour. This is a handy service if you need to send a single e-mail with no response or possibly just a single answer, but this is not the best option for dealing with multiple answers.
The thing is, who has GuerillaMail The address you use can monitor the inbox because no username or password is required. GuerillaMail bypasses this by specifying two e-mail addresses: the actual e-mail address with which you enter the Inbox and an "encrypted" address that you pass on to others. It's a great trick, but it adds some complexity that does not have to be that hard. We recommend that you keep only one secret identity in a standard e-mail service. Plus, Guerrilla Mail is about reducing spam in your overflowing inbox and not necessarily having a secret email account.