Logging onto websites from work or home allows the site owners to trace your IP address, which can sometimes help them narrow down your location. Tor is a browser bundle that bounces your traffic to computers all over the world before it hits the site you’re trying to reach, keeping your location anonymous. Women’s shelters like Transition House in Boston use it to help women access web services without leaving a digital trail for abusers.


Tor can sometimes be slow. Some sites require Tor users to enter captchas to prove you’re human, so it may not be ideal for daily use. But you can use it selectively when needed, like when you’re under online attack and want to protect your physical location. Just be aware that using Tor makes it look like you are logging into accounts from unusual locations, so don’t be surprised if you get a warning message to that effect from your email account, for example.

computer icons task or action checklistDownload the Tor Browser Bundle here: https://www.torproject.org/

You can also install a commercial virtual private network (VPN) to encrypt your data as it travels over Wi-Fi in a hotel, internet café, or other public network. While browsers like Chrome and Firefox have options for “incognito” mode, these browser options don’t hide your IP address. Additionally, incognito mode requires you to re-enter passwords for password-protected sites for each session.

You should avoid using VPNs that offer a free service. When you use free VPNs, you become the product as services sell your data in order to make a profit. There are good services that provide free or trial periods for a limited cap on browsing.

There are many criteria for picking a VPNs. You want to look for a VPN service that:

  • does not maintain activity log (no logging policy);
  • has a headquarters that is in a country with good data and privacy laws;
  • has a good reputation and business model;
  • have multiple server locations.

Recommended VPNs:

TunnelBear: https://www.tunnelbear.com/ngo-support-network
Mullvad: https://mullvad.net
Private Internet Access: https://www.privateinternetaccess.com/
ProtonMail VPN: https://protonvpn.com/ (free if you have a paid ProtonMail account)
Mozilla VPN: https://vpn.mozilla.org/
RiseupVPN (by donation, trusted, open source VPN) https://riseup.net/en/vpn

Check out more of our digital hygiene tips:

  1. Removing public data
  2. Privacy protection on domain names
  3. Https everywhere
  4. Anonymous “Tor” cloak or VPN
  5. Prepare for a DDos attack
  6. Two-step verification
  7. Privacy plug-ins/cookies
  8. Third-party permissions
  9. Image “hidden pixels”
  10. Links and attachments
  11. Install patches and updates
  12. Use a password manager/strong password
  13. Strengthen security questions
  14. Encrypt hard drive/backup data
  15. Click to play
  16. Use end-to-end encryption

Published by michelleferrier

Executive Director, Media Innovation Collaboratory; Founder, Troll-Busters.com | Online Pest Control for Women Writers and Journalists;

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: