The entry into force of the new surveillance law makes the issue of protecting sensitive information completely new. Why? The amendment of the regulations allows for appropriate services for practically unlimited access to Internet data and storage for up to 18 months. And not everyone must answer – for many people monitoring the sites they visit or downloaded files is a drastic violation of privacy. Fortunately, we are not defenseless – on the Internet we will find tools that will make browsing the web anonymously and much more difficult to monitor.
“The amendment of the law regulating the surveillance of the services significantly extends their competence in this field – it provides the possibility of surveillance of data from, quoting, computer data carriers, telecommunications terminals, IT and telecommunication systems,” explains Paweł Wujcikowski, owner of Spy Shop and It adds: “This means that law enforcement agencies will be able to monitor and collect all the user information they will share – it will be an IP or MAC address, but above all the sites we visit, the time we spend on them. And activity range. Followers will also know where and where we log in. ”
Virtual private network
VPN, or Virtual Private Network, uses virtual Internet connections that redirect traffic between the internautary computer and the server (such as the web page or service) that it wants to connect to. Such connections are difficult to monitor or block, because the “observer” does not know what pages the user actually connects to – he only knows that he is connecting to the VPN network (connections made through him are not visible to him). By using this technology, we can count on the fact that someone who wants to see us will not be able to see what sites we visited, when we did, what files we downloaded,
Anonymously on the net
Another solution to prevent surveillance is the TOR network, The Onion Router. When we are connected to TOR, the connection between our “PC” and the page or service is diverted by many computers in the network (and spread all over the world), and the history of these connections can not be traced successfully. The connection is encrypted in several ways, which virtually guarantees its anonymity. Unfortunately, the TOR, however, requires basic knowledge about its operation.
However, it is worth remembering that some sites block access to TOR users, and that we need to be aware of the noticeable slowdown in the connection (this is the result of multiple redirected data packets).
Search engine also matters
Those who particularly value privacy should opt out of the most well-known search engines that gather a lot of information about users – which can be especially undesirable in the context of surveillance law. There are several alternative search engines on the web that do not store (or do less) search history and visited sites. One of the most popular – and worth …