Summary
In this chapter, we went through making our presence online anonymous. We learned how to set up cyber anonymity and what is required to maintain cyber anonymity. We also discussed how to become anonymous online under five main topics, as follows:
- Understanding the scope of access
- Planning for connectivity
- Understanding the level of access
- Preparing the device
- Preparing applications for anonymity
First, we tried to understand the scope of access for various apps and services, and then we discussed how to plan connectivity with the objective of maintaining anonymity. We also discussed various levels of access for different resources we use in today’s world. Then, we discussed how to prepare a device to be anonymous, including secure operating systems, virtual machines, and live boot systems, which support anonymity. The last topic we discussed was how we can prepare apps to support anonymity.
In the next chapter, we will be looking at...