Bitcoin Hosting: Dedicated Servers, DDoS Protection & Bitcoin VPS

  • CALL 1-800-745-0287
  • CONTACT US
  • SUPPORT
  • CLIENT LOGIN
  • BITCOIN VPS
  • DEDICATED SERVERS
  • BITCOIN HOSTING
  • DDOS PROTECTION
  • DOMAINS
  • Home
  • Blog
  • Security
  • Leakage and Contamination: Stay Secure Online
May 12, 2025

Leakage and Contamination: Stay Secure Online

Leakage and Contamination: Stay Secure Online

by Rob Lons / Monday, 02 September 2013 / Published in Security
Leakage and Contamination: Stay Secure Online

Leakage and Contamination: Stay Secure Online

What you need to be concerned with are “contamination” and “leakage”. Those two terms are definitely something to keep in mind in your quest for anonymity.

It’s simple: everything you do online can be traced back to you in some way if you do not take precautionary measures to avoid being discovered. Since we’re talking about anonymity, let’s start with the first thing you use to get online — your computer.

If anonymity is important to you, it’s probably best to avoid buying your computer using PayPal or or your credit card. Cash is always the best way. Of course, Bitcoin has its place, but using Bitcoin to buy a computer online doesn’t change the fact that you will need an address to ship it to. Your best bet is to simply pay cash in store.

The best (and safest) way to keep your identity private is to not give out any information at all. If there is nothing on your computer that can be linked to you, then you have considerably less to worry about. Invest in a specific computer that you will use online, encrypt your hard drive (and create a hidden volume), and only use it for what it was intended for.

In other words, don’t go to the trouble of being anonymous online and then use that same machine to log into Facebook or check your real email. While it may seem like a no-brainer, it’s the smallest mistakes that often cause the biggest problems.

Security Is A Mindset

Leakage is when your data, IP address, or any other personally identifiable information is “leaked” due to improper configuration of your machine. What is often the case is when someone is using Tor, or another anonymizing network, and a program on their machine accesses the internet directly, rather than going through Tor, or whatever is being used.

Obviously, this is a problem.

What you need to be especially careful about is how you use Tor, or any other anonymizing network. Security is a mindset — there will never be a one-size-fits-all solution. You need to determine the level of anonymity you need and move as close to that side of the spectrum as possible. It is a continuous challenge because with anonymity, you’re never allowed another chance to do it right. One slip up and you can expose yourself.

And if you are really concerned about anonymity, you should probably stop using Windows.

 

Tagged under: anonymity, dns leaks, windows

About Rob Lons

What you can read next

How To Use TrueCrypt to Encrypt Your Hard Drive Using Ubuntu
How To Use TrueCrypt to Encrypt Your Hard Drive Using Ubuntu
Watch Out For EXIF Data: Your Images Can Contain More Than You Think
EXIF Data: Your Images Can Contain More Than You Think

Recent Posts

  • New Site, New Plans, New Features. Same Bad Ass Web Hosting Company.

    It’s been a long time coming… but we fina...
  • How To Use TrueCrypt to Encrypt Your Hard Drive Using Ubuntu

    How To Use TrueCrypt to Encrypt Your Hard Drive Using Ubuntu

    Why would somebody want to encrypt files on the...
  • Using Bitcoin As A Marketing Tool To Build Links, Drive Business, and Get More Engagement

    If you are a marketer and are guilty of overloo...
  • Win Bitcoins, Web Hosting & More

    We are giving away free Bitcoins. What’s up fol...
  • Watch Out For EXIF Data: Your Images Can Contain More Than You Think

    EXIF Data: Your Images Can Contain More Than You Think

    Everything you do online can be tracked in some...
  • My Monday Rant: Privacy, Censorship, and Data-mining

    My Monday Rant: Privacy, Censorship, and Data-mining

    Internet censorship, privacy, data-mining&#8230...
  • How To Get 100% Anonymous Web Hosting

    How To Get 100% Anonymous Web Hosting

    So, you want to be anonymous… You need an...

SUPPORT / HELP

  • About Us
  • FAQs / Pre-sales
  • Our Services
  • Affiliate Program
  • BWH Reviews
  • Bitcoin Resources
  • Downloads
  • Guide to Bitcoin
  • Video Tutorials

GET IN TOUCH

Call: 1-800-745-0287
Sales: Talk to sales
Support: Submit a ticket

Learn why we're the best choice

  • GET SOCIAL
Bitcoin Hosting: Dedicated Servers, DDoS Protection & Bitcoin VPS

© 2014 BitcoinVPSHosting.com. All Rights Reserved. Legal · Sitemap · Google+
Privacy Respected. Bitcoin Accepted.

TOP