Anonymity can there on the internet? Be warned, a surfer who surfs on the internet is no guarantee that anonymity be preserved. It is even the opposite. The tracking of personal data is the number one issue of Web 2.0.
Post a review on Amazon, upload videos on YouTube, place photos on Flickr, and write a status on Facebook, there are many examples. All these sites are many possibilities to scan, store and analyze traces the user leaves on the canvas.
Thus, on the web, the data are collected systematically and without the user’s knowledge. There are many methods used (IP address, cookies, Web bugs …). CNIL  has also implemented an application that allows very didactic understand that direct supervision is to our knowledge on the net: Your traces on the Internet: it is not a virtual surfing.
When the user browses the Internet, a connection is established between your computer and remote servers that host the web pages they visit. This communication is done through an internet protocol that uses IP addresses (see box in block diagram).
Thus, when a user surfs, its IP address is accessible to all the sites they visit. IP very interesting, since it allows collecting precise information about the visitor: date and time of connection, location, provider (ISP), cookies accepted or not, screen resolution and operating system. The web browser meanwhile, also leverages this address since it allows to list the sites the user has visited and therefore to analyze history in order to infer their interests.
The IP address can also be found in the source code of each email sent.
You thought forward masked through anonymous connections or false identities? Yet you have left indelible marks.
The discretion to compensate for the lack of anonymity
The anonymity seems illusory. However there are ways to be discreet on the net.
Proxy and VPN
Proxy and VPN  are two technologies that hide the IP address of the user to allow him to surf “anonymously.” Both systems allow the connection to pass on a staging server. Thus, this is the IP address of the server, and not that of the user, which is scattered across the web.
A proxy is configured within the application used to connect to the internet. Simply enter the proxy address in the web browser. Several caveats to the use of a proxy:
First, all software cannot use a proxy. Then, an application that will access internet outside the proxy will reveal the true IP. Finally, even within the browser using the proxy, some applications will not be taken into account and show the true identity of the user (secure sites (https) and streaming).
Warning, these solutions are easy to implement multiply on the net. Some unscrupulous individuals offer them to retrieve the identifiers of users, exploiting their data and lead to phishing sites (phishing)…
VPN, on the other hand, transits the entire Internet traffic through servers located usually abroad, which does not restrict its use to a particular application. A VPN is also safer because it encrypts data.
So, proxy or VPN! The choice will depend on the needs of the user. To hide his IP address, a proxy may be sufficient and it is easier to use since there is nothing to install. In contrast, if the goal is to remain anonymous and protect all data, a VPN is required. It is also very useful for people who connect via public Wi-Fi spots. This is to prevent malicious interception of their Internet connection and their data.
The Tor network
We talk about the Tor network (“onion” in English) because it is a network consisting of multiple layers (or more precisely nodes). Internet access is through a “path” random route in these nodes: it allows covering their tracks to hide the origin and contents of the connection. This system is in the form of small software to install. The Tor network however, has several disadvantages: go back often makes navigation slow, and it has security vulnerabilities.
Other anonymizing systems
There is also developed software to hide IP address (ex: JAP / JonDo or Hide My IP). Also, all browsers except provide functionality anonymization on the web.
Wherever possible, it is preferable to focus on open source programs. Why open source software is more secure than it software “traditional”? To understand, consider the browsers and ask us behind most of them. The answer is simple: multinationals (Microsoft for Internet Explorer, Google Chrome or Apple for Safari). And the leitmotif of these large groups is profitability. Choosing an Open Source nonprofit will therefore limit abuse.
Do not lose sight of the system that the user chose not to reveal its IP address, this information has…