

For example, in this utopia the user could fetch a news website, and neither the news website or the website's ISP would have any idea if the user had ever made contact before. In an ideal world, perfection would be achieved by the Tor network, Tor Browser, computer hardware, physical security, the underlying operating system, and so on.

This chapter explains the difference between anonymity and pseudonymity. This chapter provides an inexhaustive list of behaviors that users should NOT do when strong anonymity is necessary.Ĭonfuse Anonymity with Pseudonymity 7.4 Use Clearnet and Tor at the Same Time.7.2 Do Use Bridges if Tor is Deemed Dangerous or Suspicious in your Location.6.1 Change Settings if the Consequences are Unknown.5.4 Login to Twitter, Facebook, Google etc.5.3 Login to Social Networks Accounts and Think you are Anonymous.5.2 Login to Banking or Online Payment Accounts.4.4 Visit your Own Website when Anonymous.4.1 Connect to a Server Anonymously and Non-anonymously at the Same Time.3.7 Use Different Online Identities at the Same Time.3.6 Send Sensitive Data without End-to-end Encryption.3.5 Post Sensitive Screenshots or Screen Photographs.3.4 Post Full System Logs or Configuration Files.3 Identities, Personal and System Information.

