Link to this headingAnonymity
Link to this headingInternet
Link to this headingTor
Uses encryption and routing to tunnel traffic through at least three randomly selected relays (entry, middle, exit). So that the final destination sees the exit node as the source of the request.
Each relay only knows the previous and next hop in the circuit. Each layer is encrypted
- Multiple layers of encryption protect data at each hop
IP address:
DNS Requests:
VPN + Tor combination:
- VPN → Tor: VPN hides Tor usage from ISP
- Tor → VPN: Tor hides VPN usage, VPN hides activity from exit nodes
Link to this headingCellphones
https://www.phreeli.com/ privacy cell provider
IMEI (International Mobile Equipment Identity):
- 15-digit identifier assigned to the hardware of the mobile device. Think of it like a MAC address for the phone.
- You can see this on your phone with by entering the
*#06#code.
IMSI (International Mobile Subscriber Identity):
- Number stored on your SIM Card or eSIM.
- This is usually your phone number with country code.
- Vulnerable to IMSI catcher attacks (Stingray devices)
- Links your device to your mobile network subscription