Readers’ Blog

Safe communication

Popularity 2Viewed 670 times 2019-11-16 06:40 |System category:Others

Safe communication
1. New accounts are the right solution for anonymous browsing. Clean accounts with false non-overlapping information will help cover your tracks. This applies to both social networks and email services, messengers, e-wallets, etc. Individual accounts are useful when using the above encryption services, provided that they do not overlap with real accounts.

2. The right online messengers are PSI Jabber or Telegramm. They encrypt messages and do not provide their algorithms to numerous "services" that want to control the Internet. Jabber does support 4096-bit key, which is impossible to crack in an adequate time. As for casual VK, ICQ and especially Skype, they do not even hide the fact of storage and analysis of correspondence.

3. Anonymous e-mail correspondence – with the help of special services like AnoBox and I2P-Bote. They are designed to securely receive, open and read Email messages. Can provide good power, convenient functionality, SSL connection, refusal to store files, etc. Indispensable resources when working with the tor browser, VPN and other means that can strengthen the security of the Internet.

Summing up all of the above, we can say that maximum security and anonymity on the Internet begins with hiding the IP address with a VPN or other "improvised means". Working in a network it is impossible to interfere personal information with public, and it is important to encrypt all your actions with the help of special software. Use anonymous chats, messengers, email clients. Also, do not trust domestic large companies like Yandex, because they are sure "in case of something" will give all the information about You.

(Opinions of the writer in this blog don't represent those of China Daily.)


Passing

Eggs

Flowers

Shake hands

Ray
Like 0 Share
8.03K

Report

Comment Comment (4 comments)

Reply Report Monoswe 2019-11-17 23:10
Very, very many follow us from the usual excessively curious hackers to the bigwigs of the world behind the scenes and they all need something from us. Lesser crooks need our passwords ip addresses and confidential information. The special services need to know everything about our preferences, did you happen to get out of that herd of sheep that they obediently manage and do not visit those resources that you do not need to visit.

facelist doodle Doodle board

You need to login to comment Login | register


Album

Friends

    Recent comments

    • Safe communication 2019-11-18 15:07

      . Using VPN services is rarely something illegal in itself, but the content that you try to access using a VPN may very well be illegal. This is true even in countries blocking access to VPN services China Syria Iran. However, this does not stop some sites from blocking VPN services.

    • Safe communication 2019-11-17 23:10

      Very, very many follow us from the usual excessively curious hackers to the bigwigs of the world behind the scenes and they all need something from us. Lesser crooks need our passwords ip addresses and confidential information. The special services need to know everything about our preferences, did you happen to get out of that herd of sheep that they obediently manage and do not visit those resources that you do not need to visit.

    Star blogger

    Anming

    4124

    views

    Maierwei

    2603

    views

    财神

    4580

    views

    BACK TO THE TOP
    Contact us:Tel: (86)010-84883548, Email: blog@chinadaily.com.cn
    Blog announcement:| We reserve the right, and you authorize us, to use content, including words, photos and videos, which you provide to our blog
    platform, for non-profit purposes on China Daily media, comprising newspaper, website, iPad and other social media accounts.