Skip to main content

Questions tagged [anonymity]

The state of being anonymous. Meaning: not identified by name and not having outstanding, individual, or unusual features that enable identification.

1 vote
2 answers
122 views

How did he find my full real name based on my Steam or FACEIT Profile? [closed]

Yesterday, I was playing a counterstrike game on FACEIT, when all of sudden one of my teammates started bullying me for my bad plays. It was standard trash-talking for a bit, but then all of a sudden, ...
Game Account's user avatar
0 votes
1 answer
102 views

Since devices in typical house scenario are exposed to ISP, Do anonimous OS (tails/kodachi/etc) require a different scenario to keep anonymity?

Researching on this topic I found the answer of Conor Mancone for a similar question about whether Can an ISP detect or log specific devices connected to ISP-provided home routers?, which answer was ...
Zyncho's user avatar
  • 101
0 votes
1 answer
208 views

Are passkeys anonymous?

I was considering using passkeys as a 1FA. I wanted users to login/register without email or password and without logging their IP. But being anonymous would probably bring very bad things to any site....
Mike's user avatar
  • 103
1 vote
2 answers
157 views

Is hardware linked between different operating systems installed in same computer?

I know the safest bet If I want to remain anonymous is having 2 separate computers, but I was curious if having 2 OS in different hard drives (both encrypted) but on same computer the same? Is the ...
Elias LP's user avatar
0 votes
2 answers
474 views

I'd like to upload photos anonymously

my goal is to upload photos such that I preserve anonymity (not so concerned about WHAT is being uploaded, but trying to conceal WHO is doing so). I came up with the idea of taking a screenshot of the ...
Jack 's user avatar
0 votes
0 answers
171 views

Impact of Deep Learning Based Flow Correlation on Tor

It's been known ever since Tor existed that flow correlation attacks can break Tor's anonymity, but whereas in the past flow correlation attacks had a false positive rate far too high to be useful ...
DeepPSNA's user avatar
17 votes
2 answers
7k views

Is Tor over VPN a security risk?

In his talk about OPSEC, The Grugq stresses that you first have to go through TOR before connecting to a VPN. Otherwise, the VPN would be a direct link from the endpoint to you. He summarizes: TOR ...
Arbuiwer's user avatar
  • 171
0 votes
1 answer
873 views

Staying anonymous while using BurpSuite

While testing any site using BurpSuite, if we send any request it will use BurpSuite HTTP "Proxying through BurpSuite" but still we are not fully anonymous, it will still use our original ...
Noob Hunter's user avatar
3 votes
2 answers
1k views

Anonymous unasked bounty hunter wants bounty for found issues

A bounty hunter reached out to us to give us information about a security vulnerability in our company's information systems. In our estimation, the risk of exploitation for this vulnerability is ...
SirDeg's user avatar
  • 33
-1 votes
1 answer
207 views

proxy anonymity level, what is the tehnical difference ? (specific example from hide my name)

By using hidemy name I can check for a proxy if it is up or down, and also check the anonymity level using the app. A sample result looks like this: IP address Port Country, City Speed ...
C.Unbay's user avatar
  • 207
1 vote
1 answer
103 views

Authentication on public availble Restful API

We are using an API from a third party for managing content which is secured by an API key which does not change over time. Now we are building our own API to support part of that functionality. So ...
Wilko van der Veen's user avatar
0 votes
1 answer
284 views

How to configure VPN to get maximum anonymity from my ISP?

If my main intention is to hide whatever I do on the internet from my ISP, then which VPN connection should I use; TCP or UDP? Or if I need to do anything more for that purpose please tell me. Also ...
Ezio's user avatar
  • 35
0 votes
0 answers
152 views

How to make the website owner anonymous? [duplicate]

Buying an international web domain (so there is no national law to expose its details beyond the domain registrar) Not putting any personal and family name in the website What else?
user283460's user avatar
0 votes
1 answer
424 views

Alternative for secure browsing since Tor is too slow

What options for secure browsing are available these days? I always used Tor, but since the DDOS attack, even simple sites like google.com need almost 2 minutes to load. By "secure browsing" ...
JoeRogaan's user avatar
0 votes
2 answers
98 views

What is using timing and cryptotext length for deanonymization called?

Alice and Bob are communicating frequently via an encrypted overlay network. Eve can observe the timing and length of Alice's and Bob's incoming and outgoing ip traffic, but cannot read their ...
Brent's user avatar
  • 105

15 30 50 per page
1
2 3 4 5
35