Home of internet privacy

How to completely disappear online in 4 easy steps

Without protection, we quickly become transparent online. Law enforcement agencies, corporations, advertisers and even our peers can see every step we take online.

Fortunately, moving from entirely transparent to perfectly invisible requires just a few straightforward steps. Yes, it will take effort and the occasional sacrifice, but not the skills of a powerful computer wizard.

Step 1: Abandon your mobile phone

The most intrusive tracking we experience is undoubtedly through the constant connection of our mobile devices.

The data gathered from your phone is routinely made available to governments. Hacking syndicates might also gain access via corrupt employees or forgotten backdoors.

Removing the SIM card may not be enough if you want to disappear completely. Your phone could still connect to a network without your knowledge (for example, in case you need to make an emergency call).

A good replacement for a mobile phone is a tablet without a SIM card holder, such as an iPad. An iPod touch is also an excellent substitute.

Make sure the operating system of your device randomizes its MAC address so you cannot be identified by the Wi-Fi networks you use (as iOS does).

Finding a suitable mobile device is admittedly hard. Many handsets require accounts with Google or Apple, don’t receive regular updates, or don’t run critical software, like Tor.

Step 2: Abandon email and social media

This is hard not because it requires technical skill, but because you’ll leave behind people who won’t follow you into the anonymous darkness that lies behind the glitzy advertisement-filled world of venture-capital-backed social media giants.

Without a phone number, you won’t be able to sign up for many services. Even behind layers of anonymity networks, social media accounts monitor your every click and comment, giving them a lot of power over you.

Living entirely without an email account or a phone number might be impossible. You can consider running your own email server, although doing so in a secure manner is tough.

To preserve your anonymity and keep the use of email, find a paid provider that accepts Bitcoin and tolerates connections via the Tor network, ideally through a .onion address.

You might also be able to find a vendor that offers an anonymous phone number for Bitcoin use. This would be useful for any social media or chat accounts you choose to maintain.

Opt for communication networks that are federated or decentralized and do not require email addresses or phone numbers to sign up. Great examples of such are Jabber (with Off-the-record encryption) and the Bitcoin-inspired Bitmessage network (still in beta).

Step 3: Encrypt everything and route through Tor

Tor is a slow and tedious but a highly efficient anonymity network. It’s not perfect but comes closest to hiding you and your contacts from each other.

As well as using Tor, you’ll have to encrypt all your communications. Don’t exchange unencrypted emails, chats, or store any unencrypted data online.

To browse the web, use the Tor browser, ideally inside of an operating system like TAILS.

Eventually, you will encounter sites that won’t show content unless you sign up or switch back to your regular browser—a clear sign you should avoid this website.

Step 4: Use Bitcoin and cash only

You are not only tracked when you are using your own devices or accounts but also every time you make an electronic purchase.

Paying with a debit card or PayPal will identify and locate you. It’s probably best to shut down your bank account and all cards entirely.

Learn how to use Bitcoin anonymously

Bonus step: Use a VPN

Tor is a widely used software and keeps millions of people safe. However, it’s still eyed with suspicion by many governments and ISPs.

To hide your activity on Tor, while keeping the anonymity features, disguise your home internet traffic by installing VPN software directly on your router.

With a VPN, your ISP won’t see that you’re using Tor or even which Tor nodes you are connecting to. They’ll just see the IP of your VPN server, and a connection that looks like an ordinary encrypted browsing session.