How to browse the web anonymously
The average internet user leaves digital traces whenever they surf the web. These traces can include the websites you visited, the items you ordered, contact information, and even your location.
These digital traces provide third parties with an opportunity to monitor your online activities and monetize this data, for example, by sending targeted advertisements. They pose a risk in a world with rising cyber threats, highlighting the need to enhance your privacy.
You can take delicate steps to surf the web anonymously and avoid being tracked. This guide explains the practical steps to keep your online activities private and out of prying eyes.
Get 25% off on any plan, from 100 to 60,000 proxies
For a limited time, new users who purchase any plan can claim 25% off their first order. The user will have the discount automatically applied after they click on it and check out.
But that's not all — there is a free plan that comes as a supplementary offer. All users who create a new Webshare account automatically receive 10 free (shared datacenter) proxies + 1GB/month bandwidth to use for as long as they want, no credit card required. The user who signs up will get a free basic plan, and also have a 25% discount when upgrading.
Preferred partner (What does this mean?)View Deal
Before explaining how to protect yourself when surfing the web, it's necessary to understand the ways you can be tracked online. They include:
Cookies are small text files that gather information about your online activities. Websites can install cookies on your device to monitor your online activities and build a browsing profile.
Cookies have some benefits, as they store your account credentials, language preferences, and other configurations you've made on a website. Hence, you won't have to input your preferences each time you revisit the site – the cookies enable the website to remember them.
Website operators can track your IP address whenever you ping their servers. This IP address reveals your location at a city or regional level. It can also reveal your internet service provider (ISP) and the type of network you're connected to (home, business, or public Wi-Fi).
Apps installed on your smartphone often request permission to access specific data, such as photos, videos, contacts, and location information. This access is sometimes necessary, such as a photo-editing app needing access to your gallery to import pictures.
However, apps can request data permissions not necessary for their function and use the data to track you.
For example, several gaming apps have been found to collect location data and sell it to third parties. Advertisers typically purchase location data for targeted marketing, and, in worst-case scenarios, malicious actors can also acquire the data to track devices.
Email marketers can include pixels (small transparent images) in their emails. These pixels can tell marketers whether you've opened the email. The pixels can also reveal your IP address, device type, and location.
We've mentioned how websites can track your IP address. The solution to this privacy risk is to use a virtual private network (VPN), which routes your traffic through a secure, encrypted channel and hides your actual IP address.
VPN apps route your traffic through a remote server with its unique IP address. Hence, websites will see the IP address of the remote server, not your actual IP address. The remote server scrambles your data and prevents ISPs, advertisers, and other third parties from monitoring your online activities.
VPNs provide an extra layer of security when surfing the web. They also enable you to bypass content georestrictions and access articles, videos, and other data that are typically unavailable in your country. You can choose the location of your remote server for added convenience.
Hundreds of VPN apps exist, making it challenging to choose the best one for your specific needs. We've made things easier by extensively reviewing VPNs and curating a guide to the best VPN. Factors to consider when selecting a VPN include:
Your VPN should use a sophisticated encryption protocol to protect your data from unauthorized access. At minimum, it should support AES-256 encryption, an algorithm that uses 256-bit keys to protect your data. With 2^256 possible key combinations, this algorithm is virtually resilient against all brute-force attacks.
Your VPN should have a strict no-logs policy that bars it from collecting user data. This policy should ideally be audited by an independent third party, assuring users that there is no logged data for third parties to intercept.
The best VPNs have a kill switch, a setting that automatically disconnects your internet access if the VPN experiences any downtime. This way, your real IP address won't be exposed even if the VPN goes down for a few seconds.
VPNs enable you to select the location of your remote server, which significantly contributes to your browsing speed and overall user experience. The best VPNs offer numerous server locations to choose from. The higher the number of server locations, the more reliable and flexible the VPN is for users.
Excessive ads are a common complaint when surfing the internet. The complaints are even higher when these ads are targeted based on users' browsing history. You can protect yourself from this problem by installing an ad blocker on your web browser.
Ad blockers maintain extensive lists of advertising and tracking domains. Then, they prevent your browser from sending requests to these domains, ensuring you don't see ads.
Some ad blockers can also modify the HTML code of a website to prevent ads from showing. Likewise, some use algorithms to analyze a web page's structure and block the elements deemed as ads.
You may encounter websites that recognize your ad blocker and require you to turn it off before accessing their content. If you really want to access the content, ad blockers let you temporarily exclude a site from ad-blocking. Then, you can unlock the content and revert to ad-blocking when done.
Likewise, you can permanently exclude trusted sites from ad-blocking, such as your favorite blogs. What's necessary is that you can block ads from your browser and enjoy a smooth user experience. We've reviewed the best ad blockers to make it simple and easy to stay secure online.
Along with ad blockers, you can install other privacy-focused extensions to keep you safe online. For example, the Privacy Badger extension automatically identifies and blocks web trackers from your browser. It's free to use and prevents advertisers from building a profile based on your browsing activity.
Cookie AutoDelete is another useful browser extension. It automatically deletes cookies when you close a browser tab, ensuring websites can't track you across other platforms. Later in this article, we'll explain how to minimize cookie tracking or turn it off entirely.
Standard web browsers, such as Chrome and Microsoft Edge, aren't designed to maximize privacy. They have helpful features, and you can install extensions to enhance security. Still, these browsers aren't built with top-grade privacy in mind– they focus more on convenience and ease of use. If you want the utmost protection, consider using privacy-focused browsers like Tor.
Tor (The Onion Router) is a free, open-source browser run by thousands of global volunteers. It lets you browse anonymously by routing traffic through volunteer-run servers (called nodes or relays). Think of this system as passing your browsing request through several secret tunnels before reaching its final destination.
On Tor, your browser requests pass through at least three relays to obscure their source. The websites you visit will only see the IP address of the last-used relay, not the IP address of your device. Each relay only knows the previous and the next step, not the full path to your device. This system makes it very complicated to trace your IP address.
Tor is based on Mozilla Firefox, another popular standard web browser, but it has been heavily modified for enhanced privacy and anonymity. It only connects via the Tor network of servers run by volunteers worldwide.
By default, Tor blocks advertising scripts and trackers. It clears cookies automatically after each browsing session, and the default search engine is DuckDuckGo, which is designed for privacy.
Note that using Tor has its tradeoffs. Expect slower speeds than those of a typical browser, as your traffic is routed through multiple relays. Some websites flag Tor usage as suspicious or outrightly deny access to Tor users.
Likewise, Tor isn't 100% anonymous– you can unknowingly reveal your identity by logging into personal accounts, downloading files, and enabling scripts.
Search engines are an integral part of internet use. Most people use Google, Bing, and other popular search engines to find content online. However, these standard platforms also pose some privacy risks.
For example, Google stores all your searches by default and uses the data to suggest targeted search queries. This data improves your search experience, but it can also be used to identify you online.
You should use privacy-focused search engines, such as DuckDuckGo, for maximum online security. DuckDuckGo is a free search engine that doesn't log your search history or IP address. There is no user profiling, so every user sees the same search results for a given query.
DuckDuckGo has its web crawler and also curates results from over 400 other sources, including Google, Bing, and Yahoo. Therefore, you'll still get helpful results similar to the search engines you're used to, but with enhanced privacy. It has a clean interface with minimal, non-personalized ads.
DuckDuckGo also offers a privacy-focused browser extension. This extension prevents hidden web trackers from loading on your browser and automatically upgrades domains to secure HTTPS versions, thereby reducing the chances of your data being intercepted. Also, it automatically sends data sharing opt-out requests to the websites you visit, although it's up to the websites to honor these requests.
As mentioned, cookies are a common way advertisers and third parties track your online behavior. Blocking cookies from your web browser is a key privacy measure that limits these third parties from collecting your personal information.
Cookies have two main categories depending on their origin: first-party and third-party. First-party cookies are installed by the host domain, i.e., the one you visit. In contrast, third-party cookies are set by a domain different from the one you visit.
First-party cookies are used for website analytics, authentication, and personalization, while third-party cookies are used for tracking and targeted advertising.
Blocking all cookies can affect your user experience. For example, you may need to log in to your frequently used sites each time you reopen your web browser. E-commerce sites won't be able to remember items added to your cart when all cookies are disabled.
If you're comfortable with the restricted user experience, you can block all cookies entirely. Otherwise, you have the option to allow first-party cookies and block third-party ones.
Web browsers let you block cookies directly. Below are the steps for doing it on Chrome, Firefox, and Safari.
Open Chrome.
Click the three dots in the upper right corner to open a dropdown menu.
Select Settings from the dropdown menu.
Navigate to Privacy and security in the Settings menu, then Cookies and other site data.
Turn on the Block third-party cookies option.
We also have a more detailed guide to private browsing on Chrome.
Open Firefox.
Click the three horizontal lines in the upper-right corner and select Settings (or Preferences on some operating systems).
Go to Privacy & Security.
Select Custom to decide how cookies should be handled.
You can choose Block cookies for all sites or Block third-party cookies. You can also select Manage Exceptions and block cookies for specific websites.
Alternatively, you can turn on Enhanced Tracking Protection on Firefox. This setting automatically blocks ad trackers and cookies that pose privacy risks.
Open Safari.
Go to Preferences.
Click on the Privacy tab.
Choose your desired option: Block all cookies, Block third-party cookies, or Block cookies from websites. The last option allows you to block cookies from specific sites while permitting cookies from all other sites.
Some privacy-focused extensions also block cookies on your behalf. Likewise, they can send 'Do Not Track' requests to every website you visit, helping you surf the web safely. We also have a more detailed guide to private browsing on Safari.
Messaging and email apps are critical components in maintaining online security. If you're aiming for maximum privacy, consider using privacy-focused messaging and email apps instead of the standard ones, which often have less stringent security features.
For example, Signal is a prominent messaging app with sophisticated security features. It has end-to-end encryption, meaning messages are encrypted on the sender's device and can only be decrypted by the recipient's device. The Signal encryption protocol is considered best-in-class and used by other popular messaging apps.
Signal has minimal data collection, unlike many other messaging apps. It doesn't store who you messaged, when you messaged them, or how often you messaged your contacts. It only knows when you created your account and the last time you connected.
You can set Signal messages to self-delete after a specific time, and media (photos, videos, audio, etc.) can be sent as 'view once,' meaning they can't be replayed. Signal is a free, open-source app funded by donations, and its code is publicly available for review and audit. It's one of the most trusted secure messaging apps you can choose.
You can also use encrypted email apps, such as ProtonMail, instead of standard email platforms. Emails sent on ProtonMail are end-to-end encrypted. They're encrypted before they leave your device and can only be decrypted with a unique key on the recipient's device. Even ProtonMail's operators can't access your email contents.
ProtonMail uses zero-access encryption, meaning encryption keys are stored on your device instead of ProtonMail's servers. This system ensures that ProtonMail can't access user data and attackers can't read your messages even if they compromise ProtonMail's servers.
Likewise, ProtonMail allows you to send password-protected emails to other users, including those on typical email platforms like Gmail and Yahoo Mail.
Note that secure messaging and email apps aren't 100% failsafe. Metadata can still get leaked, depending on user behavior. They're designed to maximize privacy, not for illegal activities.
'The internet never forgets' is a popular and very accurate quote. Everything you may have posted on the web likely remains on it, either archived or on the original website where you posted it.
Many data brokers, also known as people-finder sites, aggregate personal information from the web and offer it in searchable databases. Someone could search for your name and view your personal contact information in these databases, thereby posing a privacy risk.
Data removal services help minimize this privacy risk. They scan data broker sites for your information and submit opt-out requests where found. They can re-check and regularly submit requests to delete your data from new people-finder sites.
You can use data removal services if you want greater privacy without having to do all the work. They help you reduce spam calls and identity theft risks. However, these services aren't 100% foolproof– they can't remove data from social media, court filings, and government records. You should play your part by not posting personal information online.
Discover why 89% of VPN users say they don't actually need this common feature

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
an hour ago
- Yahoo
Amazon Prime Day change has this analyst making a bold sales prediction
Amazon is doubling down on Prime Day. The retail giant's marquee shopping event kicks off July 8 and will run for 96 hours, twice as long as last year's. The move has Bank of America making a bold sales call: Amazon could rake in more than $21 billion in gross merchandise volume (GMV). "Extending the savings window suggests that Amazon has greater retail logistics capacity to offer promotions, and that inventory availability is not a constraint," Bank of America analysts wrote in a research note. If that prediction pans out, it would mark a nearly 60% jump from last year's Prime Day performance and represent more than 10% of Amazon's projected third quarter GMV. The firm expects sales from Amazon's own inventory, known as first-party, or 1P, to rise 55% year over year to $11.5 billion, while third-party sales, or 3P, could grow 67% to $10 billion. Amazon's stock is flat on the year, lagging the S&P 500's 6% gain. Bank of America has a price target of $248 on the stock, about a 13% upside from current levels. BoA analysts suggest the longer shopping event reflects improvements in Amazon's robotics, AI, and inventory placement efforts. The company has been growing its suite of AI-powered shopping tools, including Alexa+ savings trackers, personalized deal notifications, and virtual assistant Rufus. Despite the positive tone around Prime Day, founder Jeff Bezos raised some eyebrows this week after offloading $737 million worth of stock, according to new SEC filings. That brings his total 2025 share sales to over $8.5 billion. While sizable, Bezos's selling hasn't shaken analysts' faith in the shock. Amazon's advertising and AWS businesses remain key growth drivers, and analysts broadly view Prime Day as a vehicle for attracting new Prime subscribers, boosting ad revenue, and strengthening Amazon's brand competition from Walmart, Target, and Best Buy. Still, there are potential downsides. A longer Prime Day could pressure third quarter margins, particularly if shoppers flock to lower-margin categories or if steep promotions bite into profitability. Tariff concerns also remain a wild card, particularly for consumer electronics and imported goods. Beyond retail, Prime Day is also expected to boost Amazon's advertising business as the company pushes more ad inventory through Prime Video and recently expanded its video ad offerings. Looking ahead, investors will be watching how effectively Amazon translates Prime Day buzz into long-term engagement. Separately, Amazon is investing $4 billion through 2026 to enhance rural delivery services as it looks to reach 4,000 US locations.
Yahoo
an hour ago
- Yahoo
Amazon Prime Day returns July 8 for a record four-day run
Amazon has officially finalized the dates for this summer's annual Prime Day sale: The online shopping extravaganza will kick off on Tuesday, July 8 and continue through Friday, July 11. That means it will stretch a whopping four full days, or twice as long as previous Prime Day sales. New for 2025 will be "Today's Big Deals," a daily roster of themed offerings that will launch each morning at midnight PT (3 a.m. ET). Despite the longer length, however, Prime Day 2025 otherwise looks to follow the familiar template of Amazon's big summer sale event. Look for a wide array of deals and discounts across the full range of Amazon's inventory, mostly targeted at Amazon Prime subscribers, who get free one- or two-day delivery on most products (along with a variety of other perks) for the $139 per year fee. In the electronics space, Amazon is specifically calling out upcoming deals on its in-house brands, including "the lowest price ever on the Blink Mini 2 two-pack and Ring Battery Doorbell with Ring Floodlight Cam Wired Plus bundle," as well as savings up to half off on Eero routers, the Fire HD 8 Plus tablet and Fire TV Omni TVs. That reinforces the pattern seen in earlier years, when Prime Day generally rivals Black Friday for the best pricing of the year on Amazon hardware. Meanwhile, rival retailers like Walmart, Best Buy, Target and others will almost certainly tee up their own counter-Prime Day sales, which may simply be marketed as early or extended July 4th sales given the fact that Amazon's event picks up right after the Independence Day holiday weekend. While the official start of the sale is still three weeks away, it's worth noting that there are always an array of solid deals at Amazon. Check out our ongoing list of best Amazon deals and best Apple deals, to start. And while you consider your to-do list for Prime Day proper, delve into our evolving list of the best early Prime Day deals, which includes five expert tips, including how best to track the price history of given items so you can see if that deal is really as good as it appears.
Yahoo
an hour ago
- Yahoo
The week's top Apple deals include the newest iPad at a record-low price
Here's a little secret from someone who tracks Apple prices daily: You rarely, if ever, have to pay full price — especially with Amazon Prime Day on its way. Right now, some of Apple's most popular products are on sale, including the newest iPad and iPad mini (and both of them just hit their lowest price ever).AirPods, on the other hand, have crept back up in price (though all four varieties are still discounted). Still, I expect those prices to fall again once Prime Day hits. So if you're eyeing a deal, it's worth checking back — or pouncing now if the price is right. Apple deals can be as unpredictable as the summer weather, and they rarely stick around for long. If you have Amazon Prime, you'll get free shipping, of course. Not yet a member? No problem. You can sign up for your free 30-day trial here. (And by the way, those without Prime still get free shipping on orders of $35 or more.) The reviews quoted above reflect the most recent versions at the time of publication.