ESET proposes three options for Internet anonymous browsing

TOR, I2P and FreeNet networks are the options for Internet users to optimize browsing security and avoid tracking their searches

Internet browsing requires privacy. Users are increasingly demanding tools that protect their personal data and their searches from network pirates. On this occasion the ESET platform proposes three options to navigate anonymously.

The research laboratory of the leading cyber threat detection company analyzed the advantages and disadvantages of TOR, I2P and FreeNet for Internet users.

More than 200,000 customers use TOR

It consists of entry, transit and exit nodes through which the user passes before reaching the search. The dynamic consists of so many routes and encryption that makes it virtually impossible to track the Internet user. It is a friendly tool, easy to use and compatible on various platforms: Linux, Windows, Android. It offers good browsing speed and low resource consumption. In any case, it is important to keep in mind that the TOR “is still a network of anonymous proxies, often even overcrowded. Its use is very useful for traditional navigation, consult websites and access non-indexed content, but perhaps it is not the best option for other types of communications.”

ESET promotes the protection of users during Internet browsing

I2P for Invisible Internet Project

Its acronym in English defines this anonymous, decentralized network, with several messages going through different nodes during navigation. I2P  uses “unidirectional tunnels” of input and output. That is, the request and the response will use different routes. The tool is more complex than TOR in terms of traffic analysis. The main advantage of the network is that people can use it for everyday interactions via the Internet, as it is compatible with most applications: “browsers, Torrent and other P2P, mail, chats, games and many more. In addition, the Project documentation is clear and complete, allowing you to customize your API for any application.”

FreeNet, the peer-2-peer tool

The oldest network – it was created in 2000 – allows the user to “browse websites, consult or read forums and publish files with strong privacy and anonymity controls”. Since FreeNet is a network based on the peer-to-peer (P2P) system, users are free to publish and share anonymous content. Its structure is composed of non-hierarchical nodes, which means that the communication or message that the Internet user enters travels between different “incoming, intermediate and outgoing nodes”. In view of the fact that it stores encrypted documents, access is only possible for those who have the associated key, so it is impossible for them to be found and censored. Anonymity applies not only to those who publish but also to those who download the information.

Cecilia Pastorino, specialist in IT security of ESET Latin America has indicated: “Like many tools, each of these anonymous networks has its functionalities, advantages and disadvantages, so, if you really want to have control over privacy and navigate completely anonymous, from ESET we recommend learning to use more than one. Knowing the risks on the Internet allows you to protect yourself, have the tools to navigate and enjoy technology safely. ”



Comments are closed.