Skip to Main Content

Anonymous browsing: A simple guide to online privacy 

Imagine disappearing from the internet…and no, we’re not referring to a digital detox, but hiding your identity in the digital world of mass surveillance that we and our data live in today. Advertising and marketing companies, government agencies, and internet service providers (ISPs) have the capabilities to relentlessly track us online. Is it possible to take back control of our privacy? And how far can you go? Let’s explore anonymous browsing and the many steps you can take to being more invisible. Privacy tools like Avira Phantom VPN are a fast easy (and free!) way to start.  

 

What is anonymous browsing—and why would you want to browse anonymously? 

To browse the internet securely means taking measures to help protect your data from scammers, hackers, and anyone looking to misuse it, by stealing your identity or sending you targeted malware, for example. Browsing the web anonymously goes a step further: You try to ensure that your data is not just secure but can’t be traced back to you either. The goal of anonymous browsing is to hide your personally identifiable information, such as your geographical location, IP address, device information, and browsing history.  

Why do some people want to mask their identity anyway? Most of us have nothing to hide and, thankfully, aren’t being followed by a repressive regime. Now consider what generally happens with every online click: Companies leap into action, hoovering up personal details and preferences and scattering these across the globe, where they end up on data management platforms and in the hands of data middlemen who peddle your info as their wares. Your data is valuable as it’s used to create digital profiles on you, including your location, predicted wealth, and demographics. It’s like a vast match-making service between your details and those who want to sell you stuff so they can serve up the right adverts. Imagine you do a simple online search for “flights to Spain”. Suddenly, adverts for Spanish hotels, guidebooks, and even beachwear start appearing. You never asked to see those ads and you’ve granted anonymous third parties access to your thoughts, plans, behavior… and all for free. But your data is yours! Should you be able to control who can access it and how? If you’re yelling “yes! Absolutely” then anonymous browsing is vital.  

Being an online ghost requires some work on your behalf, plus the help of essential tools, most commonly VPNs (virtual private networks). These cunningly mask your real IP address and make it appear as though your internet traffic is originating from a different location. Another crucial aspect of achieving online phantomhood is blocking browser fingerprinting and cookies and trackers, which websites commonly use to monitor our activities. We’ll be delving into good anonymous browsing practice later, plus the pros and cons of the various privacy technology at your disposal.  

Is anonymous browsing the same as private browsing? 

No. Although they’re related, private browsing and anonymous browsing are two distinct terms, and both offer varying levels of online privacy. Private browsing is often referred to as incognito mode in many browsers, and stops your browser storing information, including your browsing history, cookies, and form data. It’s especially useful if you’re on a shared computer (or someone gains access to your device!) as your activities won’t be saved locally. However, private browsing doesn’t hide your online activity from your internet service provider (ISP), or your employer if you’re using a work network. That might be good to remember if you’re an avid user of Facebook during company time.  

To browse more privately, you can simply adjust your browser settings—but anonymous browsing requires VPNs, proxy servers, or secure browsers. You’ll need little more dedication to achieve the latter, but you’ll be rewarded with more privacy: Anonymous browsing helps prevent local data storage and it masks your online activity from ISPs, network administrators, and websites.  

It’s important to remember that although private browsing is called incognito mode, you’re not really incognito. It only removes your data after you close the browser but makes no effort to hide it while you’re online.  

Is private browsing enough? Choose your level of anonymity 

Before we leap into tracking methods and the technology available to help you thwart them, ask yourself how much anonymity you truly need. Do you simply want to keep your browsing history away from anyone who might borrow your laptop, like your children? Then adjusting your browser should be enough:  

Go Incognito in Chrome 

Use private browsing in Firefox 

Browse privately in Safari  

There are other basic steps you can take to enhance your privacy: Regularly clear your cookies and browsing history and disable third-party cookies on websites you visit. If you’re an Apple user, take note: You can generate unique, random email addresses with Hide My Email. This means you won’t have to share your real email address when filling out an online form or signing up for a newsletter. 

Now to get (even) more serious: If you want to help block advertisers, your ISP, employer, or school from tracking you online—or are a journalist, whistleblower, or political dissident whose safety may depend on your anonymity—you’ll need to deploy additional tools like a VPN and proxy server. To better see what you need, it’s helpful to understand how tracking works.  

What are the most common web tracking methods? 

Third parties can track you online, but how? Get to know their techniques so you can help shield your data and privacy.   

  1. IP address tracking  
    An IP stands for Internet Protocol and is a unique address that identifies a device on the internet or a local network. Companies, governments, hackers, and even your own ISP can track your IP address and see what sites you visit.  
  2. Cross-site tracking  
    This refers to companies tracking your browsing history between different websites so they can build a picture of your interests and purchasing behavior. E.g.: Do you use price comparison sites and read multiple reviews before buying a product?  
  3. Account tracking  
    When you create an online account, you’re freely handing over personal information, such as your name, address, and date of birth. If you want to make it more difficult for someone to track your data, avoid registering your name and bank details online—and don’t use an email address that gives away information like your full name and year of birth.  
  4. Analytics tools
    Websites often use tools like Google Analytics to collect and analyze data about their visitors, including how long they stay on the site, which pages they visit—as well as personal details like their age, location, and language. Website owners can then identify trends and patterns and see how users engage with the content. 
  5. Cookies
    Not to be confused with the sugary variety, these cookies are small files that are deposited on your computer by the websites you visit. They store information about your browsing activity (such as your login details and any items you added to your shopping cart) so they can track your behavior on a website or even across multiple sites. They also make the browsing experience more user-friendly—by remembering your details for faster logins and keeping your items in your shopping cart. Cookies come in first-party (stored on the website you’re visiting and remember your user settings) and third-party (track you between websites) flavors. Find out how to help get rid of cookies here 
  6. Pixel tags (web beacons)
    A tracking pixel or pixel tag is a tiny, invisible image that can be embedded into web pages and emails. Then when you land on that website or open an email that contains one, it sends a request to a server which records your IP address and the time the beacon was viewed. It also passes on other information like the model of the device and where it’s located. Pixel tags are often used alongside cookies to measure the effectiveness of online advertising.  
  7. Browser fingerprinting
    When you connect to the internet, your device hands a disconcerting volume of data to the receiving server, including your browser type and version, your operating system, active plugins, time zone, language, screen resolution, and other settings. Together, these details paint quite a unique picture, and the chances are extremely small that someone will have an identical digital fingerprint. Websites can use this information to identify you and track your activity across the web (even if you clear your cookies or use a private browsing mode!). 

Seven ways to browse and connect more anonymously  

There are many options to help keep your identity and online activity hidden. All come with a range of pros and cons and provide varying levels of anonymity. You may want to use multiple methods together.  

  1. A virtual private network or VPN
    When it comes to anonymous browsing, a VPN like Avira Phantom VPN is your best friend as it incorporates multiple layers of privacy protection: It assigns you a new IP address to detract from your real location, while also routing your internet traffic though an encrypted virtual tunnel. Plus, Avira’s strict no-log policy means the company doesn’t track, collect, or share your private data. 
    Pros:
    A VPN is considered the essential must-have for your everyday privacy needs and offers greater convenience and speed than many other methods. VPNs also help you leap over geo-restrictions so you can stream content to your heart’s content worldwide, wherever the VPN service is available.  
    Cons:
    VPNs can still slow your browsing speeds down somewhat—and beware of free VPN providers that may sell your data.   
  2. Secure browsers like Tor
    Tor stands for “the onion router”. This browser and its secure, encrypted network take their name from the fact that all web activity is directed through several routers (called nodes)—a bit like moving through the layers of an onion. This multi-level complexity makes it extremely difficult to track and identify users, and IP addresses and browsing history are masked.
    Tor also makes it possible to access the non-indexed web pages of the dark net, which are beyond the reach of ordinary search engines. 
    Pros:
    Tor users are nearly impossible to trace so it’s a popular choice for those in hiding, such as political dissidents fleeing oppressive regimes. It’s also free and open source. 
    Cons:
    You’ve really got to crave this level of anonymity. Tor can slow you down to a crawl and the user interface isn’t exactly intuitive.  
    For a faster, more mainstream secure browsing experience (and no learning curve) consider Avira Secure Browser. It helps block ads, trackers, and browser fingerprinting—as well as unsecure, non-HTTPS websites. The integrated privacy cleaner can remove both your browsing history and the data stored in your browser, so you’re not just staying more private, but your machine is cleaner too.  
  3. Anonymous search engines 
    The big-name search engines can record and store your searches and tend to closely track your search history to generate a profile of you. There are alternatives: DuckDuckGo, Brave Search and Startpage, for example, won’t track you, share your data with third parties, and don’t log IP addresses. 
    Pros:
    Enjoy a higher level of privacy, rest assured your searches aren’t watched or saved, get unbiased search results and an ad-free (or nearly ad-free!) experience. 
    Cons:
    You’re unlikely to get the extensive search results you’re used to with conventional search engines.  
  4. Proxy servers
    These function as a gateway between you and the internet because they process requests on behalf of users. 
    Pros:
    They can offer privacy protection and some security by helping to hide your IP address and filtering web content. 
    Cons:
    Proxies are generally considered less secure than a VPN, as they don’t encrypt your data and connection, so they’re not recommended if you handle sensitive data. 
  5. Browser extensions
    Browser extensions are free, discreet add-ons that you can install to customize your browser’s functionality. Avira Browser Safety helps stop tracking and comes with a free ad blocker
    Pros:
    They can help secure your surfing and protect your online privacy but always make sure they’re from official, reputable security sources like Avira. 
    Cons:
    Don’t overload your browser with extensions or you may risk slowing it down. And never rely on just a browser extension for anti-threat protection. Add trusted anti-malware and, ideally, a VPN.  
  6. Use a private email service
    If you send and receive highly sensitive data and are worried about your communications being intercepted, anonymous email providers could be the answer. These help encrypt your communications from end to end, and privacy-focused services like Proton Mail generally won’t ask for your personal information when you sign up. 
    Pros:
    In addition to anti-tracking and encryption, they won’t scan your emails or let third parties into your inbox. 
    Cons:
    These secure emails can be blocked by accident as some sites only allow mail from well-known providers.  
  7. Use anonymous messaging apps
    Messaging apps also play a crucial role in how Android and iPhone users can remain more anonymous. Signal is an open-source platform with HMAC-SHA256 encryption. Telegram is a popular choice that provides MTPro encryption and the option of two-factor authentication.  
    Pros:
    Providers don’t collect or store user data and are committed to privacy and security. 
    Cons:
    You can’t back up messaging history and the very small user base means you might struggle to find connections.  

Is total anonymity possible? 

It’s a lofty and ambitious goal, but 100% anonymity online can’t be guaranteed. Anonymous browsing tools can reduce your digital footprint, helping to shield your identity and enhance your privacy—but even they can’t erase your online presence altogether. Remember that you signed up for the internet at one point, so your ISP will have your billing details—as will a VPN provider if you have one. Even if you set up an email account with fake personal information and pay via PayPal, you’ll leave a trail of digital crumbs that are quickly devoured (remember Hansel and Gretel). The privacy obsessed go to extreme lengths to safeguard themselves. They pay for online services in cryptocurrencies and use the Tor browser—and even purchase internet hotspots instead of risking an ISP. For most of us, these measures are tedious and unnecessary. It’s more realistic to be vigilant, stay mindful of what you post and where you browse, and be sure to understand the capabilities and limitations of the privacy technology you do use. 

Don’t forget your overall online security too! 

While you’re trying to stop advertisers and others from tracking you, remember that it’s also vital to block cybercriminals and online threats, like viruses, spyware, ransomware, and keyloggers. They can wreak havoc if they gain access to your online accounts and sensitive data.  

  • Use reputable antivirus software and keep all software, apps, and operating systems up to date.  
  • Explore what phishing attempts look like and don’t fall for scams tricking you into divulging details like passwords. 
  • Don’t overshare on social media and keep a tight lid on your personal information. Think before pressing “like” or clicking on an embedded link. It may lead you to more than a video of a dancing cat.  
  • Never enter your personal details on website that don’t bear the letter HTTPS before the URL (it means they’re not encrypted and data transfers are not secure).  

It’s easy to browse more privately and securely with Avira VPN 

A VPN’s most essential task is your digital anonymity, and a good VPN should fulfill multiple roles: It must help keep your real IP address hidden, so wherever you go online and whatever you send and receive, no-one should know it’s you. Trusted VPN also uses military-grade (AES-256) encryption, so data is near-impossible to decipher without the key. In fact, a hacker or cracker will need to try 2256 different combinations to break a 256-bit encrypted message! Explore why Avira Phantom VPN is the reputable, no-log choice for the security conscious (and those who love streaming their favorite boxed sets, even when abroad).  

 

This post is also available in: GermanFrenchItalian

Freelance Cybersecurity Writer
Nicola Massier-Dhillon is an experienced cybersecurity and technology writer. Nicola spent many years as a senior copywriter and creative lead in marketing agencies, crafting compelling content and campaigns for major tech brands like HP, Dell, and Microsoft. She originally hales from Namibia and is a passionate advocate for the conservation of wild habitats--also putting her words to work for charities, eco-tourism, and healthcare. Nicola spends her time looking after her (wild) twins, rescue cats, and a crested gecko called Giles.
Avira logo

Help shield your identity and wipe away online traces with Avira Phantom VPN.

Avira logo

Help shield your identity and wipe away online traces with Avira Phantom VPN for Mac.

Avira logo

Feel (nearly) invisible online with Avira Phantom VPN for iOS.

Avira logo

Feel (nearly) invisible online with Avira Phantom VPN for Android.