Online Privacy

Online PrivacyVPN Guides

Onion Over VPN


VPNs and the Onion Network are two tools that are used to get a private browsing experience. Even if they do share some similarities, they don’t all route the same kind of traffic nor do they bring the same level of protection.

To get the protection you want from both of them, you can use Onion over VPN, a method that will safeguard you twice.

Even if Tor will mean that no one can really know exactly what you’re doing online, your ISP can still know that you’re using the Tor network to get access to the Internet. This is an issue because many authoritarian countries have blocked the Tor network.

Even worse, the nodes in the Onion network can be run by anyone, so a government could use thousands of relays to monitor users’ online habits. Lastly, because the traffic is unencrypted at the exit, there is a chance for the request to be associated with your IP address.

By using Onion over VPN, you avoid all of that.

Onion Over VPN Explained

In a nutshell, Onion over VPN means that your traffic will be routed first through a VPN and server and then will be sent to the Onion network. This means that as soon as your traffic reaches the final destination, it will be practically impossible to trace.

There are a couple of ways to use Onion over VPN. Certain VPN providers provide the feature directly in through their application, which is usually the simplest and most efficient way to do it. Another option is to just use a VPN, and then use Tor, although this method is not as safe.

Onion Over VPN FAQs

While using Onion over VPN is very simple, there are still many doubts in relation to Tor, so we’re here to help clear them up.

What is an Onion Network?

The Onion Router (Tor) is a network of servers that randomly encrypt and send your traffic through various exit nodes in various locations. What this means is that your data will not go directly to your destination, but will instead enter the Onion network and take at least one additional hop before it goes through a random exit node and reaches its final destination.

The main advantage Onion over VPN has over normal Tor is that your IP address is also encrypted through a VPN server, so you get extra protection.

Is a Tor browser a VPN?

No. VPNs work by receiving your real IP address and then rerouting it through one of their servers. The Tor browser works by rerouting the signal through various nodes, where each node only knows the IP address of the node “behind” and “in front” of it. This means that discovering the whole path your traffic took is very difficult. This also means you don’t get all of the advantages a VPN brings, which is why people use Onion over VPN to get the advantages of both methods.

Why do people use Tor?

Journalists in dangerous countries, activists, and whistleblowers use Tor so that they can transmit their information anonymously, without fear of being monitored. This is particularly important in places where the government has control over the internet and could prosecute for the information they pass.

For most ordinary people, Tor is a way to protect their data. Many sites nowadays can get your IP address, so through Tor, you can protect your traffic. In general, it’s used to protect your privacy.

Is Tor Legal to Use?

Absolutely! At least in the U.S. and most developed nations. Certain authoritarian countries may have banned Tor, so be sure you know the specific laws of your area before using.

read more
Online Privacy

3 Top Anonymous Search Engines to Protect Your Privacy

People have finally begun to realize that online privacy is an important issue. Google provides an immense utility and convenience in our online routine but the data it collects from our searches is something to be concerned about. This is one of the reasons why anonymous search engines such as DuckDuckGo and Startpage are gaining popularity.

These search engines leverage the search capabilities of big search engines like Google and Bing but deliver the results in a completely anonymous fashion.

Our search engine recommendations have been built for the purpose of minimizing your online footprint. They don’t collect data on users and simply deliver search results.

Why You Should Use a Privacy Search Engine

Google’s entire business model is designed around knowing as much as it can about the person using it. The purpose? That’s simple, to collect data in order to deliver targeted advertising wherever you are on the web. Each time you make a search the following information is collected and stored on its servers:

  • Your IP address
  • Time and date of search query
  • The exact query
  • A cookie – this is used to uniquely identify your computer. This is stored on your computer.

It’s not a coincidence when you see a product that you want to be advertised on some random website. Search engines and privacy are linked very closely, and you should consider alternative search engines if you want to stay anonymous.

In this article, we’ll be taking a look at the best privacy search engines. We’ve taken important factors into account such as the accuracy of search results and the level of anonymity they offer to users.

Anonymous Search Engine Recommendations

#1. DuckDuckGo


DuckDuckGo is a completely anonymous search engine that does not track any of its users. Of course, that’s easier said than done but that is exactly it’s at the top of our list. It does offer some sort of advertisement to users, but the ads are picked at random and are non-targeted. To put it simply, the DuckDuckGo knows nothing about its users.

The accuracy of search results is reasonably good, if not at par with those delivered by Google. DuckDuckGo has close ties with Yahoo and uses its search technology. Yahoo has been previously been linked to NSA, but DuckDuckGo continues to insist that it takes the promise of absolute privacy very seriously.

The performance of the website is very good, with a clean interface and fast response times. You can search for images and videos in separate tabs like Google. The image filtering capabilities aren’t as comprehensive as Google’s, with options limited to filtering images by size only.

In a nutshell, DuckDuckGo offers the most user-friendly search engine alternative to Google.

#2. Startpage


If you’re looking for an anonymous search engine that uses Google to source search results, then Startpage is the answer. The user experience isn’t as slick or as responsive as DuckDuckGo, but the overall impression is still quite good.

There are no search term suggestions as you type, so you’ll have to know exactly what you’re searching for. The interface is pleasantly clutter-free, although we’re not really sure about the blue sky background on the home page. Searches can be filtered to return images and videos, and there’s an advanced search option with additional parameters.

The site displays ads but these are completely non-targeted and not influenced by what you’re searching for. Rest assured, this is a completely anonymous search engine. The fact that it is based in Holland also helps.

#3. SearX


Still not convinced that search engines can be truly anonymous? SearX is an open-source search engine that you can self-host to ensure that absolutely no usage logs are being stored on any unknown servers. SearX uses the search capabilities of several search engines. It also allows users to choose which search engines to source results from.

The interface can be best described as ‘utilitarian’, but it’s still perfectly usable. If you’re really concerned about privacy, SearX is the way to go.

Final thoughts

Can a search engine be completely anonymous? That’s up to speculation. Companies like DuckDuckGo insist that they’re as anonymous as a search engine can be, but the fact that they use Amazon servers (which is an American company) does lead to some suspicions.

read more
Online Privacy

Beginner’s Guide to Staying Anonymous Online


After reading this article you will have an understanding of Internet privacy. We don’t want you to just understand but also to have enough knowledge to be able to act to keep yourself and your information safe. It’s easy to learn how to protect yourself online and won’t take much effort and time out of your day. This is just a quick way for you to learn to navigate the internet anonymously and you can choose which steps you want to take depending on who you want to protect yourself against.

How to Keep Yourself Anonymous

It’s frustrating to know that most sites online are linked to data collection companies. These companies work in partnership with both social networks and search engines to create a profile for each internet user. They gather this information in a myriad of ways. One of the most common ways that they do this is by using third party cookies. A quick way that you can protect yourself from information gathering is to disable third party cookies on your computer.

However, this quick fix isn’t without problems and can cause some sites to quit working completely on your computer. This actually does little in the way of protecting your information and privacy online. There’s a much better way to protect yourself, and that’s to block collectors on each page. You also need to set up your browser to allow and run secure browsing. Read on for the steps that you will need to take to accomplish this and keep your information as safe and private as possible.

#1. Use Firefox Browser

Go online and install Firefox to use as your web browser. Unfortunately, Internet Explorer doesn’t have the necessary plugins to be able to protect you, and Chrome is notorious for sending your information straight to Google when you use it. Google is one of the largest ad networks and loves getting your information. Even Chromium is known to send users’ data to companies.

#2. DuckDuckGo for Search

DuckDuckGo needs to be your default search engine, so set that on your browser. This is a privacy oriented site that won’t store your user data or any search history from your computer. Go to Tools-> Options-> Search after installing the plugin to do this.

#3. Cookie Protection

Install Ghostery on your computer. This is a plugin that will keep trackers from putting the code on your browser or installing cookies to track your information online.

#4. Consider Blocking Javascript

Install NoScript to block javascript from running. You will have to think about how you want to use this. Some people like to disable scripts globally and then allow certain ones to run when you visit a website. This way you can pick and choose what works on your computer and what doesn’t, although most websites will have trouble opening until you allow them to.

#5. Adblocking

Install uBlock to keep ad services from sending ads to your computer. This is imperative to do if you don’t set scripts globally to off in step 4.

#6. Always prefer HTTPS services and Apps

Use HTTPS everywhere, forcing encrypted connections whenever possible.

#7. Privacy Mode leaves less Trace

Open the internet in Private Browsing Mode by Tools-> Options-> Privacy. Also, select “never remember history”.

#8. Disable Geocoding

Disable geocoding, which will stop websites from saving your location information. This is tricky to do but there are guides online that can walk you through it.

If you perform take these steps toward internet safety and encourage others that you know to do them as well then the Internet will slowly become a safer and better place.

Remember to avoid government monitoring systems by using a private, no logging VPN service.

Also consider sending money to projects like Whonix, Tor, and Tails, which work for your internet anonymity. If you aren’t willing to pay for your privacy you have to wonder if it even matters to you at all!

read more
AustraliaOnline Privacy

What Everybody Ought to Know About Australia’s Meta Data Laws

We investigate Australia’s Meta Data Laws

A new scheme for data retention in Australia is now in place. It’s been active since April 2017 and is the brainchild of the Australian federal government.

According to the new laws, metadata from online communications and mobile devices must be gathered and stored for 24 months or more, to be available for scrutiny by national security agencies, as long as it’s considered necessary by said agencies.

Meta Data Implementation

The first wave of laws for data retention happened two years ago. During this first wave, the Aussie federal government let telecommunications provider companies and Web service providers know that their team members would have to collect data on their clients for 24 months.


At the time, government officials let the public know that the new rules were about protecting Australians from the threat of terrorist acts. The laws are due to a rise in the number of jihadists cases reported.

In the UK, similar regulations for data retention have been active after the intelligence agency, MI6, suggested tighter rules due to a higher terror threat level in Europe.

How Do These Laws Affect You?

You may be curious about what data is gathered and how its collection and retention may affect you. Many people are wondering about this. Detractors feel that the Australian federal government is much too vague regarding defining the type of data which will be gathered and stored.

In general, it appears that Web and mobile provider companies will need to gather and keep your metadata for twenty-four months. In case you’re unfamiliar, metadata is digital information about your digital information.

personal data privacy

To cite an example, if you made a phone call, the metadata for the particular call would show gatherers who you called and how long the conversation lasted. However, it won’t record what is discussed, which is a good thing regarding personal privacy.

It will also show your Web activities. For example, if you went to websites and did some illegal downloading, this activity would be tracked. As well, records of all emails that you sent and whom they were sent to will be gathered and stored. Also, the times that the electronic communications were sent, where they were sent to and what their subjects were would be tracked.

As well, records of all emails that you sent and whom they were sent to will be gathered and stored.

Also, locations, where you took digital photos, may be traced and picture location (GPS) data will be captured. The model of your camera may also be recorded depending on EXIF settings.

exif data smartphone

At this point, it’s not legally mandatory for ISPs to store information about IP addresses of websites that you visited. However, some ISPs may do this anyway, which means that they’ll have records of your Web history.

The process of tracking this metadata will cost money. It’s a burden on provider companies, such as Telcos and ISPs. They’ll need to spend a fortune on tracking and data storage. As well, the taxpayers of Australia will take a hit, since the government is going to put one hundred and thirty-one million dollars (all from taxpayers) into the new initiative.

Once the program is up and running, companies which need to pay for expensive data gathering and storage will probably jack up their prices. They need to turn a profit, so the consumers will end up paying for the tracking and storage of their metadata, via higher prices for Web service and mobile plans/products.

Are These Laws Necessary?

It seems like a protective measure which is positive. At least, it seems beneficial at first glance. However, it’s worrisome on a variety of levels. Those who are concerned with digital privacy believe that this new info-gathering regulation is intruding on the lives of Aussies who have a right to privacy and will be deprived of that basic right.

As well, some critics of the new plan feel that it’s a huge risk to security. In particular, one provider company, Telstra, has called the new initiative a “honey pot” for those who hack digital systems. Many data centers will be found offshore, and they are particularly vulnerable to being hacked.

hacker accessing personal data

A whistle blower in the USA agreed. This law enforcement source thinks that the new scheme will fail to prevent terrorist activity. The insiders are convinced that the new data retention scheme is a way for the government to find out almost everything about its citizens.

The Police May Access This Data

It concerns many citizens that law enforcement from local police stations to the highest agencies in the land (ASIO, Australian Federal Police) will have access to this data. As well, security agencies will be able to access it.

However, there are controls about who can see the information. There has to be a good reason. There is a trio of possible reasons which might justify access to the metadata.

One is if a person’s life may be at stake, another is to protect income that belongs to the government and the third is to investigate criminal activity which may result in a punishment lasting twenty-four months or more (in prison).

How to Beef Up Privacy

If you want your information to stay as private as possible, we encourage you to beef up data security immediately. Good communication services which are relatively secure include WhatsApp, which features encryption, and Facebook Messenger, which now offers a “secret conversations” setting to users, whereby both parties in a conversation have keys that encrypt their conversation data.

Also, invest in our recommended VPN services which shield your Web activity.

read more