Questions tagged [anonymity]
The state of being anonymous. Meaning: not identified by name and not having outstanding, individual, or unusual features that enable identification.
521
questions
1
vote
2
answers
122
views
How did he find my full real name based on my Steam or FACEIT Profile? [closed]
Yesterday, I was playing a counterstrike game on FACEIT, when all of sudden one of my teammates started bullying me for my bad plays. It was standard trash-talking for a bit, but then all of a sudden, ...
0
votes
1
answer
102
views
Since devices in typical house scenario are exposed to ISP, Do anonimous OS (tails/kodachi/etc) require a different scenario to keep anonymity?
Researching on this topic I found the answer of Conor Mancone for a similar question about whether Can an ISP detect or log specific devices connected to ISP-provided home routers?, which answer was ...
0
votes
1
answer
208
views
Are passkeys anonymous?
I was considering using passkeys as a 1FA. I wanted users to login/register without email or password and without logging their IP.
But being anonymous would probably bring very bad things to any site....
1
vote
2
answers
157
views
Is hardware linked between different operating systems installed in same computer?
I know the safest bet If I want to remain anonymous is having 2 separate computers, but I was curious if having 2 OS in different hard drives (both encrypted) but on same computer the same? Is the ...
0
votes
2
answers
474
views
I'd like to upload photos anonymously
my goal is to upload photos such that I preserve anonymity (not so concerned about WHAT is being uploaded, but trying to conceal WHO is doing so).
I came up with the idea of taking a screenshot of the ...
0
votes
0
answers
171
views
Impact of Deep Learning Based Flow Correlation on Tor
It's been known ever since Tor existed that flow correlation attacks can break Tor's anonymity, but whereas in the past flow correlation attacks had a false positive rate far too high to be useful ...
17
votes
2
answers
7k
views
Is Tor over VPN a security risk?
In his talk about OPSEC, The Grugq stresses that you first have to go through TOR before connecting to a VPN. Otherwise, the VPN would be a direct link from the endpoint to you. He summarizes:
TOR ...
0
votes
1
answer
873
views
Staying anonymous while using BurpSuite
While testing any site using BurpSuite, if we send any request it will use BurpSuite HTTP "Proxying through BurpSuite" but still we are not fully anonymous, it will still use our original ...
3
votes
2
answers
1k
views
Anonymous unasked bounty hunter wants bounty for found issues
A bounty hunter reached out to us to give us information about a security vulnerability in our company's information systems. In our estimation, the risk of exploitation for this vulnerability is ...
-1
votes
1
answer
207
views
proxy anonymity level, what is the tehnical difference ? (specific example from hide my name)
By using hidemy name I can check for a proxy if it is up or down, and also check the anonymity level using the app. A sample result looks like this:
IP address Port Country, City Speed ...
1
vote
1
answer
103
views
Authentication on public availble Restful API
We are using an API from a third party for managing content which is secured by an API key which does not change over time. Now we are building our own API to support part of that functionality.
So ...
0
votes
1
answer
284
views
How to configure VPN to get maximum anonymity from my ISP?
If my main intention is to hide whatever I do on the internet from my ISP, then which VPN connection should I use; TCP or UDP? Or if I need to do anything more for that purpose please tell me.
Also ...
0
votes
0
answers
152
views
How to make the website owner anonymous? [duplicate]
Buying an international web domain (so there is no national law to expose its details beyond the domain registrar)
Not putting any personal and family name in the website
What else?
0
votes
1
answer
424
views
Alternative for secure browsing since Tor is too slow
What options for secure browsing are available these days? I always used Tor, but since the DDOS attack, even simple sites like google.com need almost 2 minutes to load.
By "secure browsing" ...
0
votes
2
answers
98
views
What is using timing and cryptotext length for deanonymization called?
Alice and Bob are communicating frequently via an encrypted overlay network. Eve can observe the timing and length of Alice's and Bob's incoming and outgoing ip traffic, but cannot read their ...