
Recently, privacy advocates were dealt a swift blow, with the passing of S.J.Res 34. This will strip regulatory power from the Federal Communications Commission (FCC) and give it to the Federal Trade Commission (FTC). This resolution will also prevent the FCC from making any rules protecting Internet privacy. In addition, the resolution’s passing now gives Internet Service Providers (ISPs) the ability to collect, store and sell your browsing history, app usage data, and location data. All of this can now be done without a user’s consent.
In this blog, I break down the differences between anonymity and privacy. I will also look at Virtual Private Networks (VPNs) and the problems they solve, and problems they inherit. And finally, I will give recommendations to protect your privacy and anonymity online.
To properly understand what steps you can take to protect yourself, you first need to understand the difference between privacy and anonymity.
is the equivalent of speaking to a close friend in a room with the door shut. I don’t necessarily have something to hide, I just want to keep the conversation private.
Anonymity is the equivalent of riding on a crowded bus. You have no privacy, but no one on the bus knows who you are.

Almost every service that operates on the Internet will track some sort of data. It could be IPs connecting to a web server, or it could be a Bitcoin wallet, but there will be data somewhere about that transaction. In the instances where the data trail allows for direct attribution, there are measures an individual can take to better protect their privacy and anonymity if they care to do so.
While there is no single solution to the privacy or anonymity issues, one of the most popular tools for privacy protection is the VPN.. Security and privacy advocates have been using VPNs for years, so we thought it might be useful to take a closer look at VPNs and their use cases..
To fully understand VPNs, you first must understand what they do. A VPN masks your physical location and IP address, and also encrypts all of the data between you and the VPN server. Ultimately, the website you are visiting doesn’t know that you’re the originating point for the connection, as all the website logs see is connection from a VPN egress IP.
VPNs are commonly used in a number of ways. Most uses fall in the six categories below. Note that I am not endorsing using VPNs in ways that are illegal or that may circumvent the Terms of Service of any internet content or service provider:
With VPN providers, you have to inherently trust that they are not collecting or storing your logs. If you are connecting to a VPN provider, you are in theory giving them access to your browsing history, since they control the connection your connection to the internet. Also, you have no verifiable proof they are not logging your traffic or connections. Using a VPN is effectively a Catch 22. You’re putting inherent trust in the VPN provider versus putting your trust in the hands of the ISP.
In addition to changing your individual trust model, some VPN providers are known to have security issues. In one instance, several providers have had their secret keys known and shared. This is a flaw in the fundamental concept of a VPN because this connects all of the VPN’s users using a single pre-shared key, which allows for possible decryption of traffic.
As mentioned earlier in this blog, there is not a single way to solve anonymity or privacy concerns in the digital age. However, there are several pragmatic recommendations I can make to help safeguard your privacy and preserve anonymity, should that be a priority that is important to you as an individual.
A general concern about privacy or anonymity may no longer be sufficient. The responsibility is no longer shouldered by ISPs or governments, and for better or worse, falls to the individual internet user. In addition to paying close attention to new legislation and what it entails, there are certain tools and practices that you may consider adopting. Hopefully this blog offered some useful guidance on this topic and will help enable you to protect yourself in this continually changing digital world.