8

Understanding the Scope of Access

In the previous chapter, we discussed the levels of cyber anonymity, as well as how to develop a mindset and best practices to maintain cyber anonymity. This chapter provides information on how to set up cyber anonymity and requirements to maintain cyber anonymity under the following topics:

  • Understanding the scope of access
  • Planning for connectivity
  • Understanding the level of access
  • Preparing the device
  • Preparing applications for anonymity

Understanding the scope of access

In the cyber world, the most used way of providing access to services is through an identity system. We discussed different types of identity systems in previous chapters. There are centralized and decentralized identity systems. Some ...

Get An Ethical Guide to Cyber Anonymity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.