Main content

If You Think You're Anonymous Online, Think Again

A lot of the online tracking was originally justified as being completely anonymous and so we shouldn't worry about it because our names weren't in those databases — it's just cookie number "123456" went to these websites. But there's been a lot of research that shows that basically people's traces and actions are very unique and when you get a large set of data that has all these varied specific actions taken by people, that you can re-identify them. ...

What we're learning is that we can be re-identified and in fact, much of the tracking that's going on is becoming more identified — Facebook, Google, Twitter, they know who you are already, they know your name most likely, and they're tracking you across the Internet. So they also are blurring the line between the anonymous and the non-anonymous tracking.

We've learned from [Edward] Snowden, for instance, that the NSA is getting data from Google and Facebook and Yahoo and all the big companies that are out there, and in fact, even from things that I wouldn't have thought were worth our time — like information that flows between an app you're playing like Angry Birds and an advertiser that might be trying to advertise within that app. And so we have seen that these commercial databases have so much data and [are] so granular and so enticing to the government that they come in either way.

ICT - Secure [under using the following networks and tools with a integrated User Interface (UI) to create necessaries accounts and security keys] protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.


Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.

What does I2P do for you?


The I2P network provides strong privacy protections for communication over the Internet. Many activities that would risk your privacy on the public Internet can be conducted anonymously inside I2P.

Are you looking for an alternative DNS provider that is open and democratic, are you concerned about censorship?

Share, Chat, Browse. Anonymously. On the Free Network.

Share files, chat on forums, browse and publish, anonymously and without fear of blocking or censorship! Then connect to your friends for even better security!

About New Nations

New Nations unveils the power structure of the Internet and extends the existing digital network into a new dimension. It creates new Internet addresses (ccTLD) for unacknowledged groups such as the Tibetans, the Kurds, the Tamils, the Uigurs, the Sahrauis and others.

As a community project, New Nations tests new forms of global togetherness and communicative exchange.

A Virtual Private Network, or VPN, is a group of computers (or discrete networks) networked together over a public network namely, the internet. Businesses use VPNs to connect remote datacenters, and individuals can use VPNs to get access to network resources when they're not physically on the same LAN (local area network), or as a method for securing and encrypting their communications when they're using an untrusted public network.

.bit is a top-level

domain that was created outside of the most commonly used domain name system of the Internet, and is not sanctioned by ICANN. The .bit domain is served via the Namecoin infrastructure, which acts as an alternative, decentralized domain name system. Use of the .bit domain requires a copy of the Namecoin blockchain, a supporting public DNS server, or a web browser plug-in.

GNUnet is a free software framework for decentralized, peer-to-peer networking and an official GNU package. The framework offers link encryption, peer discovery, resource allocation, communication over many transports (such as tcp, udp, http, https, wlan and bluetooth) and various basic peer-to-peer algorithms for routing, multicast and network size estimation.