Surf anonymously!

Anonymization is the disguising of the start and destination point of a connection that exists for communication or data exchange. A fundamental characteristic of anonymization is the removal of characteristics that allow conclusions to be drawn about the user.

Anonymisation is required because it may not be sufficient to encrypt communication in order to effectively protect oneself on the Internet. The connection data, for example IP addresses, remain open. Even if attackers and supervisors cannot see the contents of the communication directly, they can still see what kind of communication it is and with whom the communication exists or from where the information was retrieved. For effective data and communication protection, it may therefore be necessary to disguise the start and end points of the communication. Anonymisation services or networks are used for this purpose.

IP address as identification feature

The IP address plays a central role in the identification of Internet users. In Internet communication, data exchange takes place on the basis of data packets that are exchanged between clients and servers. For this purpose, the data packets are provided with the IP addresses of sender and receiver so that the received data packets can be assigned to the respective communication partner on both sides. When data packets are transmitted, the IP addresses are also required for routing to the destination. This means that the IP address can be viewed by anyone who receives the data packet. Since the route taken by a data packet on the Internet is more or less random, you can never be sure that the data will not be picked up and analyzed somewhere. Even if the data itself is encrypted, some information about the communication partners can be determined via the IP addresses.

For example, a Whois query leads to the Internet provider used. Since Internet providers use IP addresses locally, it may be possible in combination with a geolocation service to find out the city, perhaps even the district. Advertising networks already use these services to place regional advertisements. In online shopping, creditworthiness is calculated on the basis of location information.

Although IP addresses are often assigned dynamically, they may change with each session. However, there are other ways of securely identifying an Internet user.

IP address obfuscation options

Because the IP address plays a central role in the identification of Internet users, anonymization techniques are used to conceal them. The correct IP address is replaced by another IP address. On the way to the Internet, one or more address changes or address translations are carried out somewhere. The data packets are forwarded via a forwarding server (proxy), a VPN gateway or an anonymization network. This is where anonymisation takes place.

Proxy

The use of a proxy is the easiest way to move anonymously on the Internet. All you have to do is enter the IP address of the proxy in the network settings of the client or in the browser.

Proxy means deputy. It accepts requests from clients and forwards them to the target server on the Internet. The server only sees the IP address of the proxy and not of the client. In the opposite way, the proxy receives the data packets from the server, exchanges the IP address and forwards them to the client.

With this constellation one must consider that the returned data can be stored and evaluated by the proxy. A proxy is a “man in the middle” that is anonymous, but whose operator must be trusted unconditionally. A supposedly anonymizing proxy can also spy out passwords and rewrite requested web pages without the user noticing anything on the client side.

VPN gateway / VPN tunnel

VPN services are another possibility for anonymization. VPN software is installed on the client, which forwards all data traffic to a VPN gateway on the Internet. The gateway exchanges the IP addresses so that the target servers on the Internet only see the IP address of the VPN gateway. The data traffic between client and gateway is encrypted. However, data traffic is normally transferred between the gateway and the server. Read more at plural.mx.

In principle, the VPN gateway does nothing other than a proxy. Only that the functions of the VPN gateway are mostly based on hardware and therefore work faster than proxies. Proxies are typically installed as a service on a server. The speed then depends not only on the network connection, but also on the load.

Typically, it is not the task of a VPN gateway to record data traffic. However, this does not mean that the operator does not do it after all. For example also connection data. It would also be conceivable that secret services, criminal investigators or other attackers could latch into the VPN gateway and monitor communication or access data traffic. The user must encrypt the data via the VPN gateway before it is sent so that the data cannot be seen by others. Provided that the recipient can decrypt the data.

In addition, you should use a public DNS server instead of the standard DNS server of your own provider, because website operators can find out the actual IP address of the visitor via a forced DNS query, which is based on an embedded image on a subdomain.

Tor – The Onion Router

Anyone who seriously wants to anonymise has to put in more effort. It is not enough to conduct data traffic via a proxy or a VPN gateway. One option would be onion routing, as used in the Tor anonymization network.

Tor obscures the IP address of an Internet user by using multiple nested encryptions across multiple stations. For the target server, it looks like access is coming from a Tor network computer connected between the user and the server. Because of the nested encryption, Internet connections over the Tor network are much slower. Watching videos, VoIP telephony and online gaming are hardly possible.

Mix cascades are another principle of anonymization. These are chains of servers that encrypt data packets so that only the server at the end of the chain can decrypt them. The mixes, as the servers are called, first collect the data packets in order to forward them in random order. Pseudo data packets between the mixes are intended to make monitoring even more difficult.

Mix cascades at JonDonym (commercial service) are fixed and do not change during the connection. The user may choose the mixes himself and can consist of 2 or 3 servers, one of which should be located abroad. In this way it is difficult for investigating authorities to penetrate the complete mix cascade. Cross-border cooperation between investigating authorities and secret services would be necessary in order to obtain the connection data.

JonDonym does not offer absolute anonymity either. As soon as the attacker has access to all mix cascades taken by the data traffic of a certain user, anonymity is broken. However, mix cascades with JonDonym are much more secure than proxies or VPN gateways. The mix operators are all known and equipped with certificates. Also with JonDonym it cannot be excluded that attackers and supervisors gain access to the Mix servers. However, the risk is lower than with the Tor network.

What anonymization cannot do

  1. Effective anonymisation depends on the integrity of the operator and the trust of the user. In principle, the operator of the anonymization service or network may not record or evaluate any data. In principle, no connection data. Especially not over the period of time during which the connection lasts.
  2. While data retention is suspended in Germany, telecommunications providers, including anonymization services, in other European countries have to store their customers’ connection data for several months. For this reason, anonymization is only possible to a limited extent. Anyone who commits an online offence should be aware that they can be deanonymized despite anonymization.
  3. In order to protect oneself effectively against anonymisation by secret services, it is advisable to refrain from using the services of providers with headquarters or parent companies in the USA, Canada, Great Britain, Australia, New Zealand and Sweden. The secret services of these countries access data traffic on the Internet or have access to personal data of large Internet services.

Anonymization can become a security risk

Making data traffic anonymous is an extremely atypical process. In comparison, the encryption of data is common for many Internet users, even unknowingly. For example, in online banking or online shopping.
On the other hand, anyone who additionally anonymizes data must be aware that they are acting conspicuously. Attackers and supervisors assume that anonymous communication has something to hide. This can be the reason for an attacker or supervisor to record the communication and take measures to deanonymize it. The use of anonymization techniques or services to gain more security for data or communication can therefore have exactly the opposite effect. It reduces the security of communication and data transmission.

Identification via Cookies / Deanonymization via Cookies

For the sake of completeness, it should be noted that IP addresses are not the only identifier. If you are using a browser, the IP address is not the only identifier, but cookies, which are used to recognize returning visitors. Cookies are data records that are stored on the user’s computer. Usually as a text file. Personalized services are dependent on the data contained therein.

  • Web pages that display advertisements go one step further and place third-party cookies on the computers of their visitors. In this way, the advertising provider can track the user across web pages. Third party cookies must generally be blocked. They are used exclusively for tracking the websites visited. Not to use them means no loss of comfort.
  • In addition to cookies, there are other ways to identify users. Active content, such as Flash, Java and Javascript, can cancel out anonymisation measures. For example, if proxy solutions or anonymization networks such as JonDonym or Tor are used.
  • Activated Javascript can reveal the real IP address, even if it has been obfuscated using Tor or JonDonym. Effective anonymization requires the deactivation of active content. Unfortunately, it is often the case that websites without Javascript are not or only with difficulty accessible.

Browser Anonymization

In particular, the advertising industry is constantly coming up with new techniques to recognize a user. A typical example is the setting of cookies on the website visitor’s computer. But even if the user has switched off cookies, there is still DOM storage and, in case of doubt, fingerprinting (browser version, resolution, window size, plugins, …), which can be used to recognize the user.

For this there is the concept of an anonymizing browser. For this purpose, the web content is not rendered in the user’s browser, but in the browser within a sandbox on an anonymization server. From there, the web content is then transferred to the user’s browser. All elements and content that could identify or even endanger the user are concealed and executed on the server. This includes obfuscating the IP address, setting cookies and executing Javascript on the server.

However, the server serves as a proxy, which means that the data is passed on to third parties. This is a problem if, for example, you do online banking or otherwise have to authenticate yourself.

Small Business Cloud

The acquisition of a complete IT infrastructure is particularly expensive and associated with high risks for small companies. Often own servers cannot be operated economically. That’s why we offer the Small Business Cloud especially for small companies.

Here we provide all important services such as e-mail exchange, storage, desktop and backup as hosted solutions.

  • Provision of Hosted Exchange
  • Cloud Storage
  • Cloud Backup, Desktop-as-a-Service
  • Hosted MDM, Hosted Helpdesk
  • Hosted E-Mail Security and individual Private Cloud Infrastructure

Hosted exchange

Use the email and groupware features of an Exchange server without your own hardware. For example, we set up a Microsoft Exchange Server in our data center, which offers you the same functions as the variant with its own server.

Cloud storage

Manage and share your data with a hosted storage solution in the small business cloud. Not only do we provide easy access, but we also provide fast and secure data transfer and multiple clients to use. With a simple billing model, you have full cost control.

Cloud Backup

With our cloud backup solution, you determine the intervals at which your data is backed up. The system automatically detects changed file segments and only replaces them. This saves you a lot of backup time and your Internet bandwidth is not used more than necessary. We back up your data in two data centers where the data is mirrored. We create a quasi backup of the backup.

Desktop-as-a-Service (DaaS)

With Desktop-as-a-Service (DaaS) from the Small Business Cloud, you have full access to your personal work environment from any end device. Quickly set up your employees’ workspaces and manage access to data and applications. From any device, you can always work productively on your personal desktop. All you need is Internet access.

Hosted MDM (Mobile Device Management)

Manage all your company’s mobile devices with one central service and without any IT infrastructure. With DT Netsolution’s Hosted Mobile Device Management you have a secure and reliable platform for software loading, inventorying and securing all mobile devices in your company.

Hosted Helpdesk

Map processes in an online helpdesk and increase your efficiency. Whether customer inquiries, projects or trouble tickets – with a single platform you can standardize business processes. With the Hosted Helpdesk, you don’t need any IT infrastructure and can concentrate on your core business. We take care of hosting, maintenance and updates for you.

Connecting Your Computer to your Telly

The Benefits of Your Setup

Why really would you like to connect your personal computer to your telly? Well, one simple explanation could be a much better picture along with a bigger screen. Nowadays, it has never been more straightforward to connect a computer to your television. With just a couple connections, along with a tiny bit of knowledge of electronics, you will have your set up in no time. The question remains, how do you connect your pc to your telly? This review is able to help you determine the ins and outs of your entire set up.

Video Connections

The most significant aspect that you will need covered if you are connecting your computer to your tv is your links. With no right component
connections, your image should come out bleary, or you may not get a working picture. Also, if you really do not have the necessary connections, in addition, you run the danger of damaging your computer or television. Because most of the computers obtainable in the market nowadays carry VGA, DVI and the HDMI output, these are the best connections to work with. The HDMI input signal gives you the best image feasible for the video display.

Audio Connections

Of the VGA, DVI and HDMI connections, just the HDMI is capable of delivering both video and audio signals. Additionally, in the event you just have a DVI or HDMI connection available, then you’ll have to think of another way to get sound from your computer, unless you’re satisfied with the audio quality that the computer speakers can give you. If you’re not met by your computer’s audio quality, then you could link your personal computer’s sound output to your TV’s sound input signal with an RCA cable or an optical connection.

The Computer’s Operating System

Luckily, the computer’s operating system has little or nothing related to your hardwired connections to the telly. Nevertheless , some computer models may have operating systems that might be a little more challenging to put up. If this happens, it is best to consult someone that has experience in working with operating systems. The essential operating systems that’ll readily operate when you’re connecting your personal computer to your television are Macintosh, Windows and Linux.

Adjusting Your Settings

The settings on your own computer are equally as important as the settings in your tv. Even if you’re away by just a tap of the mouse, you might not get an image on your telly. Once your links are set, ensure that your computer is defined in projector mode and which you have your television set on the right video input. Your computer and tv will give you options on the color settings and audio settings.

The Results

Connecting your personal computer to your television will definitely give you excellent consequences. You may have the ability to stream pictures from your own computer and have them shown right in your television. You may also do your computer work with all the extravagance of a sizable TV display. Another great advantage is that you can provide your computer monitor some slack and utilize your tv as a computer screen for a time. Following some of these suggestions on connecting your computer to the television may let you get going on your new setup.