10

Proxy Chains and Anonymizers

In the previous chapter, we discussed how to maintain cyber anonymity and techniques that we can use to maintain cyber anonymity related to the following topics:

  • Avoiding behavior-tracking applications and browsers
  • Using secure messaging apps
  • Using disposable emails and contact numbers
  • Using virtual machines and virtual applications
  • Maintaining cyber anonymity at all the layers

This chapter explains the tools and techniques that can be used to maintain cyber anonymity. During this chapter, you will come to understand what proxy chains and anonymizers are and gain knowledge on censorship circumvention. We will discuss live Operating Systems (OSes) for maintaining anonymity and how they work, how Virtual Private ...

Get An Ethical Guide to Cyber Anonymity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.