Skip to Main Content
An Ethical Guide to Cyber Anonymity
book

An Ethical Guide to Cyber Anonymity

by Kushantha Gunawardana
December 2022
Beginner to intermediate content levelBeginner to intermediate
322 pages
8h 46m
English
Packt Publishing
Content preview from An Ethical Guide to Cyber Anonymity

9

Avoiding Behavior Tracking Applications and Browsers

In the previous chapter, we discussed how to implement cyber anonymity and prerequisites to maintain cyber anonymity. When your objective is to maintain cyber economy, you need to think about multiple layers and plan accordingly. To do that, we need to understand the scope and implement the correct internet connection, as that is the medium to connect to cyberspace. When the medium is secured, you need to prepare a device and applications to maintain cybereconomy, as devices and applications track you in different ways.

This chapter explains how to maintain cyber anonymity and discusses the areas and techniques that we can use to maintain cyber anonymity. As we already know, applications ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cybersecurity and Privacy Law Handbook

Cybersecurity and Privacy Law Handbook

Walter Rocchi
Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition

Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition

Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims

Publisher Resources

ISBN: 9781801810210