-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

An Ethical Guide to Cyber Anonymity
By :

In this chapter, we went through making our presence online anonymous. We learned how to set up cyber anonymity and what is required to maintain cyber anonymity. We also discussed how to become anonymous online under five main topics, as follows:
First, we tried to understand the scope of access for various apps and services, and then we discussed how to plan connectivity with the objective of maintaining anonymity. We also discussed various levels of access for different resources we use in today’s world. Then, we discussed how to prepare a device to be anonymous, including secure operating systems, virtual machines, and live boot systems, which support anonymity. The last topic we discussed was how we can prepare apps to support anonymity.
In the next chapter, we will be looking at...
Change the font size
Change margin width
Change background colour