Link to this headingAnonymity

Link to this headingInternet

Link to this headingTor

Uses encryption and routing to tunnel traffic through at least three randomly selected relays (entry, middle, exit). So that the final destination sees the exit node as the source of the request.

Each relay only knows the previous and next hop in the circuit. Each layer is encrypted

  • Multiple layers of encryption protect data at each hop

IP address:

DNS Requests:

VPN + Tor combination:

  • VPN → Tor: VPN hides Tor usage from ISP
  • Tor → VPN: Tor hides VPN usage, VPN hides activity from exit nodes

Link to this headingCellphones

https://www.phreeli.com/ privacy cell provider

IMEI (International Mobile Equipment Identity):

  • 15-digit identifier assigned to the hardware of the mobile device. Think of it like a MAC address for the phone.
  • You can see this on your phone with by entering the *#06# code.

IMSI (International Mobile Subscriber Identity):

  • Number stored on your SIM Card or eSIM.
  • This is usually your phone number with country code.
    • Vulnerable to IMSI catcher attacks (Stingray devices)
  • Links your device to your mobile network subscription