Web Anonymization Techniques 101

This triangle graphic illustrates how convenience detracts from security and privacy

Conflating Anonymization With Privacy

Telemetry and Metadata

Credit: Tribune Media Services

Web Browser Options

Credit: Statista & Mashable
Apple is one company that takes user privacy seriously

Internet Search Engines

Credit: Statista
Credit: @businessunions

Privacy Tools

Privacy Badger


Tor & Virtual Private Network Web Proxies

Virtual Private Networks (VPN)

Credit: PrivacyTools.io

The Onion Router (Tor)

Tor Bridges

Credit: ProtonVPN
Twitter post I made about the topic of Tor over VPN money trail vulnerabilities

Command Line Interface (CLI)


Mobile Devices

Physical Anonymity Hacks

Additional Resources:



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store