PRIVACY — A MYTH ?

IS YOUR DATA REALLY SECURED ??

OR IS THE GOVERNMENT HAS ACCESS TO YOUR DATA?

BELIEVE IT OR NOT THE GOVERNMENT CAN ACCESS TO YOUR PERSONAL DATA,CHATS,PHONE LOGS

ETC WHENEVER THEY WISH TOO.

India does not have a dedicated law on data protection and privacyIndia has also not adopted any international instruments on privacy or data protection

HOW DOES THIS WORK??

For that you will need to know what is AN ISP or Internet Service Provider these are the companies like AIRTEL,VI,JIO etc which provides us internet and calling .

The internet surfing done by you, every single data packet goes THROUGH the ISP .

So if the government wants to or if the governments demands the ISP for your data they can provide it .

THIS IS HOW YOUR DATA TRAVELS THROUGH THE ISP

HOW TO BE ANONYMOUS ON THE INTERNET OR HIDE YOUR DATA FROM THE ISP ??

  • VPN OR VIRTUAL PRIVATE NETWORK

VPN IS SERVICE THAT PROVIDES AN ENCRYPTED TUNNEL FROM ONE ENDPOINT TO THE OTHER SO EVEN THE ISP CANNOT SEE THE DATA TRAFFIC THROUGH THE ENCRYPTED TUNNEL

BUT AGAIN CHOOSE THE VPN WHICH HAS A NO LOG POLICY WHICH MEANS IT DOES NOT KEEPS THE LOGS THE USERS DATA OR THE GOVERNMENT CAN DEMAND FOR YOUR LOGS TO THE VPN PROVIDERS

THE BEST VPN WHICH I USE AND DOES NOT HAVE A LOG POLICY IS NORDVPN

  • TOR or ONION ROUTER

Tor aims to conceal its users’ identities and their online activity from surveillance and traffic analysis by separating identification and routing. It is an implementation of onion routing, which encrypts and then randomly bounces communications through a network of relays run by volunteers around the globe.

UNLIKE THE VPN TOR USES MULTIPLE IP ADDRESS LAYERS ENCRYPTED FOR YOUR PROXY . THATS WHY IT IS CALLED A ONION ROUTER

ALTHOUGH THE TOR IS MOSTLY USED FOR GOVERNMENT FOR ACCESSING THEIR SECRET FILES AND FOR DEEP AND THE DARK WEB WHICH CAN BE ACCESSED THROUGH .onion SITES ONLY

UPCOMING BLOGS……..

HOW CAN YOUR END-TO-END ENCRYPTED CHATS CAN BE EASILY DECRYPTED

DEEP WEB AND DARK WEB

QUANTUM COMPUTING AND CRYPTOGRAPHY

Published by nameerclay

CEH | Independent Security Researcher| Security Analyst | Computer Engineer | Penetration Tester | Network Security |

One thought on “PRIVACY — A MYTH ?

Leave a comment

Design a site like this with WordPress.com
Get started