Hide Your IP Address: How to Anonymously Surf the Net

Manuela Lenz

Alongside their benefits, the growing digitization and interconnection of the world have a dark side too. When surfing the Internet, computers, smartphones, and devices broadcast a wide variety of data, including your IP address, allowing anyone in the know to determine your location and eventually, identity. Although marketing data that companies collect is more of an annoyance than a threat, hackers, security services, or authoritarian regimes can use such information to far more nefarious purposes.

There are often very banal reasons for the desire to conceal your IP address. One of the most common of these is to bypass geo-blocking, which denotes the restriction of access to certain content or websites on the basis of one's physical location. Streaming services in particular vary their offers, and prices from country to country.

In this article, we'll explain how you can conceal your IP address online, and how much anonymity this actually offers.

1.

Hide Your IP Address Through a VPN

One of the most-favored methods to conceal one's identity online is the usage of virtual private networks (VPNs). This is a closed (private) network, which allows for data to be encrypted and sent anonymously through the net.

This is most easily achieved by agreeing to a subscription with a commercial VPN provider. Through this method, your IP address changes to that of the VPN server, creating a secure tunnel between you and the server in the process. Your destination (a website, for example) will only see the VPN server's IP address, and not that of your device.

The site you're visiting then responds to the VPN server's request, sending it the desired data. During this transmission, all traffic starting with your network map to the VPN server is encrypted. In this way, an additional layer of security is created which protects you from prying eyes.

Apart from this, VPN software often includes additional functions or features which enhance your data and technical security. For this reason, companies, organizations, and even authorities use VPN networks to provide their employees with added security when remotely accessing programs or information.

Since the first commercial services appeared, a number of VPN providers have emerged, some of which offer several thousands of gateways around the world. The server's location can be selected, which creates a number of interesting possibilities, particularly in regards to circumventing attempts to geo-block content. Of course, this allows for content from around the world, such as the BBC, to be streamed in areas where it would otherwise be blocked owing to licensing.

Often, a VPN service can be registered for with little more than an email address. Some services even offer the ability to register without any data at all, and to pay for subscriptions with Bitcoin, or even by cash in an envelope. Without exception, all providers promise not to save logs or to give data to third parties, however, as our review shows, whether this promise is backed up with action is open to interpretation.

2.

Surfing Anonymously With a Browser Plugin

Should you only want to browse the Internet anonymously, and not use other programs or clients that rely on an Internet connection, the browser plugins offered by VPN providers can lend you a hand. These don't only encrypt all of your browser activity, but simultaneously conceal your IP address. A number of useful extensions, such as Hotspot Shield's free VPN proxy, or ZenMate's free VPN are available for both Mozilla Firefox and Google Chrome.

Opera comes with an integrated and unlimited VPN service. In contrast to other VPN apps, you don't need to register separately, but can use the VPN function by activating it in the settings. There, you can select a virtual location for your connection, or automatically be designated one. Unfortunately, unlike most VPN apps or providers, you cannot select a specific country, but only a region (Asia, North America, or Europe).

Another drawback: Opera's integrated VPN does not allow for multimedia content to be streamed from abroad, since the IPs are already known to streaming services, and as a result, blocked.

Plugins are not for everyone. Many believe that they are just another means for collecting personal data. If using these methods, you should remember that the secure tunnel you've created only protects your browser. Concretely, this means that while your surfing is anonymous, other applications can still see your "real" IP.

Good to know:

There is a common rumor online that the usage of VPNs throttles your connection speed. In reality, however, there is almost no noticeable difference between VPN and non-VPN connection speeds owing to the extra encryption; in terms of a figure, this equates to less than 5% of the maximum total bandwidth.

3.

Hide Your IP Using a Proxy Server

A proxy server is a kind of intermediary that engages in client-server communication when you request a website. It accepts your requests and forwards them to to the destination using a new IP address. The response is then returned to the proxy server, and back to you. In this manner, the sender of the request remains anonymous, and no direct connection exists between the requester and the destination.

Proxy servers only need to be configured once in the client's network settings, thereafter allowing Internet traffic to always be routed in this manner. By using this approach, regional content restrictions can also be bypassed. In contrast to VPNs, however, your data traffic is not encrypted, creating a much greater security risk. As such, we don't really see proxy servers as lasting solutions for concealing IP addresses.

A special kind of proxy: Tor

For most, "the onion routing project" (TOR) is a byword for the so-called Darknet. Originally, TOR was used by the US Armed Forces to clandestinely communicate with the civilian government, and as such, is not accessible through the regular Internet.

Just like an onion, the TOR network is composed of numerous layers. Access is achieved through an encrypted TOR client, which is little more than a modified version of Mozilla Firefox. The "entry node" can be one of any TOR server from a list which is loaded when accessing the client, and chooses a random connection through the network. To do this, the client sends a request to a selected node, from where the data packet is then forwarded to the next node, and so on until it reaches its destination. Each node only knows the node before and after it, but not the source, or exit node. The exit node never receives the user's IP address, allowing for them to remain completely anonymous.

However, even on the TOR network, you aren't entirely anonymous, since the system, despite all of its security measures, has two weaknesses:

  • Not all connections through which a data packet is transferred are encrypted, particularly on the route from client to entry node. Complete security can only be guaranteed if you manually configure SSL/TLS encryption for your browser, or connect to TOR using a VPN.
  • Alongside private administrators, a number of nodes are overseen by state authorities. Should an exit node be operated by one of these, they will be able to view all of your network traffic.

In addition, TOR only partially conceals the sender's IP address, not protecting the application (client) itself, or the browser's digital signature.

Author: Manuela Lenz
Manuela Lenz is a trained IT specialist and worked for 20 years as a system administrator and project manager for large companies. Since 2017, the IT specialist has been a passionate IT-author. For EXPERTE.com she writes about project management, software and IT security.
Other languages:
Deutsch 
More about VPN
Best VPNs for France – Comparing 22 Providers
Avast SecureLine VPN - Review []
KeepSolid VPN Unlimited - Review
Best VPNs for Germany – Comparing 22 Providers
Best VPN for Italy – Comparing 22 Providers
Best VPN for Amazon Prime Video - Comparing 22 Providers
Best VPN for the US – Comparing 22 Providers
Best VPN for Disney+ - Comparing 22 Providers
Best VPN for Netflix - Comparing 22 Providers
Best VPN for China - Comparing 22 Providers
PrivateVPN - VPN Review []
Private Internet Access - VPN Review
TorGuard - VPN Provider Review
VPN Speed Test - Which Is the Fastest VPN?
Best VPN - Review of 22 VPN Providers
Best VPN Extension for Chrome - TOP 3 (+ Alternatives)
Best Free VPN - TOP 5 Services (+ Alternatives)
ExpressVPN vs. NordVPN - Who will win?
Best Firefox VPN - TOP 3 Firefox Extensions
VyprVPN Review - Swiss VPN Provider
Avira Phantom VPN Review
CyberGhost VPN Review
IPVanish VPN Review
Surfshark Review - Best Value for Money
TunnelBear Review - The Likeable VPN Provider
HideMyAss! VPN Review
Perfect Privacy Review
Hotspot Shield VPN Review
ProtonVPN Review - The Secure VPN
NordVPN Test - Our Best Overall
PureVPN Review
Windscribe Review - The Canadian VPN Provider
hide.me VPN Review
Mullvad Review - The anonymous VPN
ZenMate VPN Review
ExpressVPN Review - Worth The Price?
How to Configure a VPN in Windows 10 - A Piece of Cake!
VPN on Raspberry Pi - It's That Simple!
Configuring a VPN on an iPhone
VPN Protocols - An Extensive Overview
Configuring a VPN on an Android Device - How to
WireGuard VPN - The VPN Protocol of The Future?
Anonymous Browsing - How to Surf Anonymously Online
How to configure a secure VPN connection in MacOS
More about IT-Security
Cyber Attacks - 3 Current Threats and Countermeasures
HDD and SSD - How to Safely Wipe Your Hard Drive
Phishing: Recognizing the Threat
Data Theft: What Is It? How Can I Protect Myself?
Best Password Manager - 12 Tools Reviewed
How To Remove Junk Files From Your Windows PC
VPN Leak Test - Is Your Private IP Public?
Browser Fingerprinting - What Is It and How Can I Protect Myself?
Best VPN - Review of 22 VPN Providers
Internet Censorship - Site Blocked in China, Russia or Turkey?
Password Generator - Generate a Secure Password
Browser Privacy Check - Which Traces Do I Leave on the Web?
Password Checker - How Secure Is My Password?
Darknet - What Is It and How Can I Access It?
Data Breaches - What Is a Data Leak? Have You Been Affected?
Internet Pitfalls - The 7 Biggest Dangers Online
Data Recovery - Restoring Deleted Files
Secure Messengers - The 5 Best Alternatives to WhatsApp
Anonymous Search Engines - 3 Alternatives to Google
Doxing - What It Is and How You Can Protect Yourself
Privacy Browsers: The Best Browsers for Maximum Security
Two-Factor Authentication - This is how you secure your accounts
Ad Blocker - How to Protect Yourself From Annoying Ads
Secure Password - What Makes a Strong Password?
Do Not Track - What It Is and How It Can Protect You
Manage Passwords - Best Way to Store Passwords
Anonymity Online: Tor and the Tor Browser
Identity Theft on The Web – How To Protect Yourself
Best Cloud Backup - 7 Online Backup Providers Reviewed
Best Antivirus Software - 11 Programs Reviewed
How To Change Your IP Address - 3 Simple Ways
Email hacked? How To Find Out if Your Email Has Been Hacked
Anonymous Browsing - How to Surf Anonymously Online