قالب وردپرس درنا توس
Home / Tips and Tricks / How to send anonymous emails

How to send anonymous emails

Yes, you can be anonymous online. At least under the right conditions, but it's not necessarily easy. Your daily identity is constantly tracked by accounts that you're signed in to, and by third-party vendors hoping to better target your ads. This means that your favorite browser is usually filled with trackers to keep track of your online activity.

In addition, does he know what's going on with your ISP, other intruders in passive (or active) government data collection, and in all kinds of data? The bottom line is that you need to take specific steps to ensure a degree of anonymity on the internet.

If you only want an anonymous email account that nobody in your business or private life knows, it's not that hard. However, one single mistake is to log in to the email account before securing your connection, or access your non-anonymous identity at the wrong time, and your identity may be revealed.

This tutorial will guide you through the necessary steps, depending on how far you want to go, you can either use all the advice or just read the parts you need. We explain why every step is helpful for your decisions.

Step 1
: Get an Anonymous Workspace

If you really want to remain anonymous, it's best to have a separate digital workspace just for your secret identity. In this way, there is no risk of overlap between your everyday accountant and your anonymous whistleblowing / Mr. robot identity.

If you set up an account with a regular browser on your day-to-day computer, it's enough for someone to lurk in your PC and oops! Your anonymity.

This is about your anonymity Some options.

  torlogo Gate Project

Level 1: Install the TOR Browser on a USB stick. If your bets are fairly low (that is, if your account is detected, this is not the end of the world), it will suffice if you run TOR from a USB drive. The TOR Browser is a version of Firefox that connects to the Onion Router (TOR) network. This system forwards your Internet connection through multiple nodes (computers) before switching to the open internet. Using TOR obscures your actual IP address. In addition, by default, the TOR browser does not save your browsing history, so your activity is kept secret. To keep the TOR as safe as possible, read Tor's tips on how to stay as secure and private on the Internet as possible.

For more information, see our tutorial in the TOR Browser .

Level 2: More advanced users can run an entire operating system, such as: For example, the Linux distribution for privacy. This is like a completely separate computer without a second physical device. Again, it's about setting a firewall between your real identity and your anonymous account.

Level 3: If you are extremely paranoid or are found out, this means a non-life-threatening disaster-discrete laptop used only for your secret identity. You should pay for your device, preferably in cash or with a disposable Visa gift card, to avoid the laptop being reconnected to your office. On the laptop an encrypted Linux variant should be executed. However, if you need to use Windows 10, make sure that you enable your computer with a local account. Disable all possible tracking methods during the setup. Do not use Cortana. Do not install unnecessary software on this device and do not log on in your normal life. The idea is to have as little additional information as possible on this laptop. Additional applications and mixing your anonymous life with your actual life are a big "no". Do not forget to put a tape or sheet of paper over your webcam. It's extremely paranoid, but even Mark Zuckerberg does.

Step 2: Location, Location, Location

  Free Wi-Fi Hanohiki / Getty Images

You never want to access your secret identity from home or work. This is a bad idea, as it is possible to specify an Internet Protocol (IP) address that could be traced back to you. In order to find this, you would have to do some advanced anger, but to be anonymous you have to make sure nobody knows where you really are. Keep your anonymous activity in a local café, library, or other location where public Wi-Fi is available. If you're really paranoid, it's probably a good idea to pick a location that's not too close to your everyday location.

Source link