Home Geeky Scoop 10 ways for private internet access to stay anonymous & protect online privacy

10 ways for private internet access to stay anonymous & protect online privacy

21 min read
Comments Off on 10 ways for private internet access to stay anonymous & protect online privacy

10 Ways to stay anonymous while browsing and protect your online privacy. This article will tell you ways of private internet access.

The Epidemic of Exposure

Private Internet Access is not a luxury but a need today. Browsing anonymously on the internet is nothing short of an art nowadays. Knowledge is our right and so is privacy. Almost every online activity is tracked unless we put an effort to block it. Our actions, locations, properties and even emotions are now being tracked.

If you haven’t read my previous article on working with the TOR network, go ahead and take a quick look. It will help you understanding who is the stakeholder in this privacy business? For your reference, there basically 5 ~ 6 stakeholders in network communication.

Stakeholders in your Data

Here, the term “stakeholders” refer to the people or organizations with vested interests in the data that goes around the Internet. These stakeholders are the sender, the Receiver, the ISP, the Government agency, advertisers, & hackers. The objective of browsing anonymously is to hide your personal data from stakeholders except for the sender and receiver.

10 ways for private internet access to stay anonymous & protect online privacy
Stakeholders in the data

There are 19+ Government agencies around the world watching the Internet and call traffic. NSA, CIA etc. have major programs to monitor network and call traffic. With so many advertisers and humongous advertising market, we are nothing but numbers.

If you search something, next thing you will notice that you are getting relevant ads everywhere. You will see such ads on Facebook, an app, or your Gmail inbox. This article will tell you the ways with which you can stay anonymous while browsing.

Google and other advertisers know this because

  1. You do not have private Internet access.
  2. You have absolutely no Idea how and what google collects from you and what are your rights.
  3. Google and other networks are tracking your activities.

Private Internet Access while Browsing

Here is a list of software, websites, and some tricks that can help you browse anonymously over the Internet. There are simple and easy ways which can help you to access internet privately. So without further ado let’s dive in.

1. Using TOR for your online privacy

You can Privately Browse Internet using The TOR Browser Bundle. You can download the Tor Browser Bundle from their official website.  In a nutshell what TOR browser does is that it uses the TOR network to access the Internet. If you want to learn about the extensive working of the TOR network you can see my article on TOR Network’s Working.

Tor Logo
Credits Tor Project

There are some downsides to using TOR network as well. First is that you need good bandwidth to get basic browsing experience. The second downside is that you can not see videos and downloads large files over TOR Network. Sometimes TOR browser eats up your bandwidth so much that other browsers can not connect to the Internet.

Last but not the least, your ISP may try to block the TOR connection as well, so you might want to check that out. Solution to that particular problem is to use TOR with VPN.

2. Using TOR on Chrome

You may not like to switch Tor on and off again and again, beside that is the way too serious business. We came across a great chrome extension Tor Browser Button. You can use this tool to configure basic proxy settings to use TOR Network for private internet access.

What this extension does is that it builds a bridge between your browser and the TOR Network. You can easily switch it on or off with a click of a button.

Steps to Configure Tor Browser Button

  1. Go to Chrome Web store and download the extension.
  2. Navigate to Jeremy Benthum’s GitHub page and download Tor Bridge Script.
    1. If you have Windows machine, please download and unzip “win.zip” file from to your computer, and run the run.bat file.
    2. For  Mac, download and unzip “mac.zip” and run “run.sh” file.
      Tor Bridging Options (step 1 & 2)
    3. You will see the screen with 6 options.
      1. Press 1 to start TOR bridging. Once “Tor is connected successfully!” message is displayed, you can use Tor Browser Button add-on to connect your browser to the TOR network.
        Tor Connection Success (step 3)
      2. To stop TOR connection press 2.
      3. To get a new TOR identity, please press 5
      4. press 6 on your keyboard to restart entire TOR Connection Process.
  3. Now Click on the Tor Browser Button to enable or disable the TOR relaying.
  4. Go to Tor project’s test page in order to check if you are actually using Tor or not.


Tor Chrome Extension Enable or Disable options


3. Using online VPNs

You can use Free Online VPNs for private internet access. VPN stands for Virtual Private Network, VPNs allow users to securely access a “private network” and send their data remotely through public networks. It’s like using a computer from remotely, only no one knows which computer you are using, so they can not trace it back to you.

A VPN is as good as you are, once you leak your private information over VPN, it can be traced back to you. So, be a good lad and don’t do that. Don’t make the same mistake as the manager at Deloitte did, which lead to a worldwide database compromise of Deloitte.

There are plenty of good VPNs out there, Tunnelbear is a pretty fast VPN and we use it. It is also free and paid, free is enough for normal usage.  Then there are Hide.me , WindScribe that provide essentially same service as Tunnelbear, but it is a tad faster than latter options. You can try others if one doesn’t work in your country.

4. Online Proxy Servers for private Internet Access

Proxy Servers represent you on the Internet instead of you. The only difference between the Proxy Server and the VPN is that generally, proxy handles browser’s traffic only, but you can configure a VPN to handle entire system’s traffic. Proxies are generally servers, while the VPNs are a WAN (Wide Area Network) with private enterprise rules.

Following VPNs are good enough for personal use, you can try any VPN and let us know your experience with them.

4.1 Kproxy.com

For common use, KProxy is the best tool as a proxy, in my opinion. It gives you 10 server options to switch if any one of them doesn’t work. And I think that’s really cool because I don’t have to switch to a different proxy every now and then.

4.2 Proxysite.com

ProxySite is a site specialized Proxy, it can give you access to sites like Youtube, Wikipedia, Facebook etc if it’s blocked in your country or network. It can be used for a general purpose proxy.


 4.3 ProxyFree.com

Proxyfree is just like KProxy, but it also shows you the RTT options (Round Trip Time ) with which you want to access your target website. Least RTT means the fastest server.

5. Google translator as a Proxy Service

You can also use the Google Translator as a Proxy Service. All you need to do is to open translate.google.com in your web browser, and type in or paste the target URL. In language, the setting makes sure that if you want the page in its original language then change the source language other than the original language.

For example, if the page is in English and you want it in English, then change the source to some other language, otherwise, Google won’t translate it.

6. Using TAILS OS to become entirely anonymous

We have discussed TOR in details in other articles, and in this as well. But there is one more thing if you are willing to take the TOR experience to next level. The Tor Project guys launched a Linux variant of TOR, called TAILS. In TAILS , the Private Internet Access infrastrucure is setup in fabric of it’s code.

It preserves your privacy and anonymity by completely taking over the processes of an OS. It will allow you to

  1. Use the Internet anonymously and deceive censorship.
  2. All connections to the Internet go through the Tor network.
  3. Leaves no trace on the computer, except asked explicitly.
  4. Uses high-end cryptographic tools to encrypt your files, emails and instant messaging.

But using the TAILS is no joke and it’s not for a regular user. It is recommended for Investigative Journalists, Cryptographers, Penetration Testers, Whistleblowers, Developers and Enthusiasts. If you still want to use this OS we can write an article or a series of article on its use, just let us know.

You can understand the complexity of installation by the fact that it needs two USB flash drives to make a Live USB drive. You can see the installation instructions on Tails’ official page.


7. Chrome Extension for multiple Proxies and VPNs 

There are a plethora of Chrome Extensions for VPNs and Proxies. We use and recommend following Chrome Extensions for Proxy purposes.

7.1 AnonymoX

The anonymoX is a very simple extension, its size is only 415 KB, so it does not make chrome slow. This is the only reason we recommend this extension over others.

7.2 Hola VPN

Hola is one of the oldest VPN extensions of chrome. There is a good user base that uses Hola and you should give it a run. Hola does have high-speed servers that get you a good snappy web experience.

7.3 Browsec

Browsec is more or less like Hola, it’s servers are not as fast as Hola but it does give pretty amazing results encrypting your network traffic. It gives you basic security a VPN suppose to give.

See Also :

10 Best Google Chrome Extensions of 2017


8. Plain Windows Proxy Settings

You can also use the Internet settings of windows to use proxy servers. It is just as good as any other proxy server for private internet access. Just follow these steps to configure your windows to use a public proxy :

8.1 go to start > Run > type inetcpl.cpl and hit enter

8.2 Click on Connection tab > “Change Proxy Settings

8.3 Click on Lan Settings

8.4 Go to ProxyNova.com to get a proxy server’s IP and port and enter them into proxy server details.


9. Using TOR on iPhone

You can use the TOR on your iPhone, but do not install the apps available on AppStore. As mentioned by the Tor Project, none of these apps actually use the TOR network.

Follow our guideline to use TOR on iPhone, you need to jailbreak your iPhone for this.

10. Using TOR on Android

You can use the TOR on Android using Orwall,  Orbot and Orfox apps. We have covered this in details in our article here.  Orwall is a firewall that routes the DNS requests through it to the Tor network, the Orbot bridges the network connection between the Tor network and browser, the Orfox is basically a browser that is configured to use the TOR network. It’s a miniature android version of TOR browser bundle.

you can see our tutorial on using Tor for Android.

So , that’s all for now. Let us know your views on this article, if you like this article do share it with friends and family. Like our Facbook page and twitter to get latest updates.

You may also like

10 Best Android Apps Not on the Play Store of 2017




Load More Related Articles
Load More By Guru Boy
Load More In Geeky Scoop

Check Also

Get a Genuine Windows 10 for as cheap as $3 | Legal and Working

1 Get Genuine Windows 10 for as low as $ 3 You can own a legitimate windows 10 for as low …