0 0
Read Time:53 Second

The main criteria for choosing a tool to ensure the anonymity of your OS is the functionality and quality of ensuring anonymity (reliability of redirecting and blocking traffic). You can evaluate the level of anonymity using the following services:

  • Identification of the use of anonymization tools.

https://2ip.ru/privacy/

  • Search for IP leaks or other data relevant to anonymity.

https://whatleaks.com/

  • Check if you are using Tor network. Be very careful with this service – it does not support IPv6. If you incorrectly configured traffic routing on your PC, then this service will write that Tor is used, although all IPv6 traffic can go directly, revealing your IPv6 address.

https://check.torproject.org/

  • Search for various leaks.

http://www.doileak.com/

  • Search for DNS leaks.

https://dnsleaktest.com/

  • What every web browser knows about you.

https://webkay.robinlinus.com/

  • Checking prints that can be collected from your web browser.

https://amiunique.org/fp

  • Additional material: I recommend that you read the selection of resources to check the level of personal privacy and security on the network.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence