In short, it is a web proxy, which looks like a regular web page. You just go to a site with a web proxy, type the URL you need in the query line, and click the "Go" button (this procedure is very similar to searching in search engines). After that, the page of the site you requested will open, but its address will be the address of the CGI proxy.

Using anonymizers (cgi proxy), you can anonymously navigate the entire Internet without changing your browser settings and without using any additional programs.

If you do not know how to build a chain from a CGI proxy, read about it at the bottom of this page.

Examples of using anonymizers (these links may no longer work and are given only as an example):

http://jproxy.uol.com.ar/jproxy/- you need to enter the URL you need after this address. For example:
http://jproxy.uol.com.ar/jproxy/http://www.google.com/

https://proxy.magusnet.com/- after this address, you must also enter the required URL, but through "-_-". For example.

and doesn’t offer the same level of protection. Never use it for online payments, BitTorrent download, home banking and any task where security is a must. (Read on for more details)

Anonymster is glad to offer you our Anonymous Proxy Server Free .... because we value our readers.

A simple way to gain anonymity on the internet without getting into your pocket. Surfing the net with our free tool will conceal your identity online making your activity on the web more secure and private.

However, this tool shouldn’t be confused with a VPN connection.

We are about to explain to you the difference between a proxy server online and a VPN connection.

Best VPN

ProviderDetails
9 Best All-Round

Starting From $ 6.67
✓ Best overall performances
Unblock Netflix
Amazing customer service
30-day money back
More expensive than competitors

10 Best for Anonymity

Starting from $ 2.62
High-speed connection
Double VPN
Unblock Netflix
30-day money back guarantee
Refund may take some time

11 Best Value VPN

Starting from $ 2.45
✓ 45-day money back guarantee
No-logs
Unlock Netflix, Hulu, Sky, YLE
Slightly slower than competitors

Christmas Offer !!

12 Best User-Friendly

✓ Free Trial available
✓ Super user-friendly
30-day money back guarantee
P2P, BitTorrent allowed
Keep some logs

13

Starting from $ 6.49
10 Devices allowed
Amazon FireTV App
24/7 Live Chat
Based in the USA

Special Offer $ 3.99 67% Off

14

Starting from $ 3.29
No-logs
✓ Unblock Netflix
30-day Money back guarantee

Black Friday - 80%

16

Starting from $ 3.29
Kill switch
P2P, BitTorrent allowed
31-day Money Back Guarantee

Black Friday Deal $ 1.32

How To Use Our Online Web Proxy

Using our proxy server free is like a walk in the park. You don’t have to set up your device or change any setting in your browser.

Just type the URL in the proxy web browser bar that you see at the top of this page, and the magic will happen instantly. You will be connected to the website anonymously and free of charge.

When Can You Use Our Free Web Proxy Server

This is a very handy tool that you can use in several scenarios.

When You Should Never Use A Web Proxy

Even though this is a fantastic tool, it comes with some limitations. Never make a mistake to think that a Proxy Web, either free or not, will give total anonymity and protection. This is not the case at all.

It will add extra protection to your data, but it will not encrypt it as a VPN does. So there is still a chance for people to snoop into it.

For that reason, we strongly recommend you to not use it for:

  • BitTorrent download... File sharing is illegal when copyrighted material is involved. If you get your hands on that, you become the target of surveillance agencies looking for law infringements. The online proxy browser doesn’t provide adequate protection. You may read our guide on.
  • Online Payments... Whenever you need to use your Credit Card, Paypal or any other payment methods to, you need a bulletproof connection. Our free tool doesn’t offer that kind of connection so do not use it if you want your money to be safe.
  • Streaming... Web Proxy has a tendency to slow down your connection so it may work with streaming content or it may not. In any case, it is not the best tool for a fantastic streaming experience. As good as it can be, it will never be as stable as some of the fastest VPN connections like, or.
  • As a general rule, never use it for any task when security is a must.

What Are The Differences Between Proxy Web And VPN Connection

It may look like the difference between a Web Proxy and a is minor. Both connect to a remote server to access the Internet and both conceal your real identity online.

That’s what deceives several users, especially the ones that just reason in term of money and don’t see the point of paying for a service when.

You simply need to look beyond the surface to understand that the two services are as different as black and white.

Here is a list of the main differences:

  • The Web Proxy server protects only the app you are using... For instance, if you are using Firefox to browse the net, only the traffic that goes through this browser is protected. Other applications like, for example, or other browsers opened at the same time are still exposed. The instead protects all your device. Once you install the software, it will automatically shield any application that goes online. Plus, if you set the VPN on your home router, all the devices that connect to it will benefit from the same protection.
  • The Online Web Proxy doesn’t encrypt your data... This is one of the key points to keep in mind when deciding which tool to use. This is true for both free and paid services. The Proxy hides your real IP but doesn’t encrypt your data. That's why sometimes it is faster than a VPN. The lack of encryption means that hackers, cybercriminals, government agencies or anyone who want to snoop into your private business may be able to do it. Not so with a VPN connection. The use and encryptions algorithm that makes it impossible to break into your data.
  • Proxy Web may have problems with some websites... Flash content or JavaScript may be too much for this tool to handle. For this reason, you will see that even using our Free HTTPS Web Proxy some web pages will not display correctly or the layout is messed up. You will never bump into this problem if you use a VPN connection.
  • A VPN connection is a versatile tool... As we just explained, a Proxy web has certain limitations in term of security and usability. Instead, using a VPN provider, your Internet experience will be enhanced for several reasons. For instance, you can use a VPN connection to access any kind of web content, and you’ll never have issues even with Flash or JavaScript.

> If you subscribe to one of the fastest VPN providers, you can have access to streaming contents like Netflix from all over the world without buffering problems.

> Having your IP hidden all the time you will get the best deals when shopping online. Since you are anonymous 24/7, companies cannot collect information on your Internet behavior and therefore will not have any possibility to push annoying ads to you or adjust the prices to their benefit.

> Government surveillance will be out of the picture... Even if they try to have a look at your private life and discover your businesses, they will end up empty-handed since your data will be entirely shielded by the VPN connection.

> A VPN is a must if you want to enjoy the Internet to the full. For instance, despite where you are around the world, you can follow your favorite sports events live, watch your country’s news, in your own language, use, play online games and a lot more.

Do you still believe that a Web Proxy and a VPN are the same things?

Conclusions

We hope that at this point you’re not disappointed since you’ve no reason to be so.

Our free online Web Proxy is a great tool to add anonymity to your connection. Of course, is not the right tool for every task and it’s not the one-fits-all solution to Internet security.

We didn’t set these limitations ourselves. Unfortunately, this is how this kind of tools work even if you are willing to pay a monthly fee for that.

In any case, you are welcomed to use it for free when you have to perform minor tasks. Read the information on this page carefully, and you will quickly understand when our free tool is a wise choice and when it’s not.

Look at things this way. You can use the Proxy web free of charge and enjoy some of its benefits. So, feel free to play with it as long as you like and experience the benefit that such a tool may offer you.

At the same time, make good use of this experience to think of how much more benefits you can enjoy if you give yourself the total protection that only a VPN connection can guarantee you.

We promise you that your vision of the Internet will never be the same anymore.

OUR WORK

Our team has tested more than 50 VPN and more are soon to come.

Every month, we update our tests to keep you up to date. Based on the test results, we decide which ones are the Best VPN providers.

Disclosure: We receives compensation from some of the VPN we review. We are independently owned and the opinions expressed here are our own.

In this post, you can find a suitable anonymizer for any site. My list consists of 110 free anonymizers, which is periodically updated and replenished.

I do not know who and when invented anonymizer, but the one who did it probably could not dream of how useful his invention would be.

Anonymizers (or proxies, proxy - English) have existed for almost as long as the Internet itself, and everyone who has encountered the problem of accessing closed sites probably knows more about anonymizers than I do. Briefly and clearly about what it is, as well as a list of the best anonymizers in 2020, I have outlined below, I hope this material will really help someone.

Why do you need an anonymizer

Most often, anonymizers are used to access blocked sites. Almost everything that is blocked by Roskomnadzor, other state regulators or providers can be opened using an anonymizer.

The main function of the anonymizer is to mask the IP address, which makes your presence on the Internet anonymous - quite a useful function for those who do not want to give out their real location.

Anonymizers are very popular among gamers. They allow you to be in the game in incognito mode, hiding your real nickname and account information. That is, the enemy now knows absolutely nothing about you, which accordingly gives certain advantages in battle.

Anonymizers are very easy to use and there are several types of them. If they are of little interest to you, then feel free to go straight to the list, if not, then here is an ultra-short educational program.

The types of anonymizers differ primarily in the blocking bypass technology. In addition, there are paid anonymizers (they are not on my list), with and without advertising, as well as limiting the passing traffic and unlimited (but with a bunch of ads).

The anonymizer works on the VPN principle, passing traffic through its servers, which are outside the jurisdiction of state regulators or Internet providers. It is the physical location of such servers that allows anonymizers to open access to blocked sites.

The most common and simplest type of anonymizer is web anonymizer ... This is an ordinary site with a search line, where the domain of the blocked site is actually driven in. This is ideal for accessing regular sites, but absolutely useless for sites with multimedia information (videos, music, TV shows, etc.). Another negative point is the amount of advertising, but more on that below.

Browser extensions ... A very convenient solution and always at hand. The quality of service depends directly on the developer, which is usually some VPN provider. There is no advertising or there is very little of it, it copes with multimedia content better than web anonymizers, but sometimes it functions with errors.

With a slight stretch, anonymizers include proxy servers ... It's not really an anonymizer, but it does the same. Installation requires manual configuration in the browser, but it's worth it. An important point is that after configuration, all traffic (and not just the site that needs to be unblocked) of this browser will go through the proxy server.

Browsers with built-in anonymizer can be classified as a subtype of anonymizer. Such browsers are little known, they are few, but they offer free VPN encryption, which is much cooler and safer than an anonymizer. It does not require additional settings, but like any browser you need to install it. In addition to the well-known Opera and Tor, there are also such as Avast Secure Browser or Globus VPN Browser.

Anonymizers open any blocked site on the Internet, including the popular social networks Facebook, Vkontakte, Odnoklassniki, as well as YouTube, regardless of the country of location.

Now anonymizers are among the most visited Internet resources. And this is not surprising, because every day around the world, the registries of prohibited sites are replenished with new sites, applications, plugins and other carriers of information.

In Russia, as you know, the main pest of the barrier-free environment of the free Internet is RosKomNadzor, which by its bans only spreads the popularity of free anonymizers.

It takes time and money to support the viability of any anonymizer.

Millions of visitors per day pass through their sites, and this requires stable servers with an established infrastructure.

In addition, it should be understood that the free availability of the service as such does not bring any earnings to the anonymizer providers at all. All they have is ad revenue, which is clearly not enough.

Therefore, many of them are born and die like stars in the sky.

Is it legal to use anonymizer?

In 2017, a law banning anonymizers came into force.

That is, any Internet services that help to gain access to prohibited sites were outlawed. At the same time, it was assumed that the anonymizer should have been previously connected to the RosKomNadzor monitoring system.

This meant disclosing information about its owner, network address, login and password for access. But, as they say, the idiocy of Russian laws is compensated by the impossibility of their implementation.

Even the drafters of the law themselves did not know how all this should work. The authorities tried to complicate this process as much as possible for an ordinary user, but as it turned out later, they did not succeed in completely restricting Russians' access to anonymizers.

Below you will find a list of 110 working anonymizers in 2020 year (January 2020), which is periodically updated and replenished. So if for some reason a certain anonymizer still doesn't work, there should be plenty of other options.

All reviewed anonymizers are free.

110 free working anonymizers 2020

2 Hiefrom - http://hidefrom.com/

3 Unblock Facebook - https://unblockfacebook.com/

4 Ultrafun - https://ultrafun.net/

5 Proxy7 - https://www.proxy7.club/

6 Proxy Unblock - https://proxyunblock.site/

7 Unblock Website - https://unblockwebsites.info/

8 Web Unblocker - https://webunblocker.xyz/

9 VPN Browse - http://vpnbrowse.com/

10 Unblock Web - https://unblockweb.online/

11 Online Proxy - https://onlineproxy.online/

12 Proxy Zagon - https://proxy.zagon.pe/

13 Unblock Video - https://unblockvideo.xyz/

14 Unblock Websites - https://unblockwebsites.site/

15 Turbohide - https://www.turbohide.com/

16 YouTube Proxy - https://youtubeproxy.online/

17 Leo Paul Mihai Pavel - http://leo.paulmihaipavel.com/

18 Unblock Site - https://unblocksite.net/

19 My Proxy - https://www.my-proxy.com/

20 Much Proxy - http://muchproxy.com/

21 Stop Censoring - https://stopcensoring.me/

22 ProxyPX - https://proxypx.com/

23 Proxsei - https://www.proxsei.com/

24 Best proxy - https://best-proxy.site/

25 Browser Webcam - https://browser.webcam/

26 Un-censored - https://un-censored.appspot.com/

27 Fastp - http://fastp.org/

28 Unblockasites - http://unblockasites.info/

29 Hide My IP - http://www.hide-my-ip.net/

30 Free Proxy - freeproxy.win

31 Proxy Site - https://www.proxysite.com/

32 Top Proxxy - http://www.topproxxy.co.vu/

33 Hiden4me - hiden4me.co.vu

34 Paul Mihai Pavel - http://paulmihaipavel.com/

35 Free Proxy - https://freeproxy.win/

36 Web Proxy - https://webproxy.best/

37 Unblock Websites - https://unblock-websites.com/

38 Proxy Site - https://proxysite.one/

39 Unblock YouTube - https://unblockyoutube.video/

40 Unblock Videos - https://unblockvideos.com//

41 Video Unblocker - http://www.videounblocker.net/

42 Croxy Proxy - https://www.croxyproxy.com/

43 Hidester - https://hidester.com/proxy/

44 Kproxy - https://kproxy.com/

45 Free-proxy - https://www.free-proxy.com/

46 ECXS - https://www.ecxs.asia/

47 Change IP & Country - http://anonymizer.nntime.com/

48 Proxy 2014 - http://www.proxy2014.net/

49 KProxy Site - http://www.kproxysite.com/

50 Anonymouse - http://anonymouse.org/anonwww.html

51 4everproxy - https://www.4everproxy.com/

52 Dontfilter - http://dontfilter.us/

53 New IP Now - https://www.newipnow.com/

54 Mega Proxy - https://www.megaproxy.com/freesurf/

55 Boom Proxy - https://boomproxy.com/

56 Unblock Proxy - https://unblockproxy.me/

57 Anony Mizer - https://www.anonymizer.com/ (14 days free trial)

58 Privoxy - https://www.privoxy.org/

59 Ninja Web - https://ninjaweb.xyz/

60 24 Proxy - http://www.24proxy.com/

61 World Flag Championship - http://worldflagchampionship.com/pr

62 Fibreprox - http://fiberprox.us/

63 FilterByPass - https://www.filterbypass.me/

64 Main proxy - http://mainproxy.pw/

65 Yxorp - https://yxorp.pandemonium.ovh/

66 Kanema - http://www.kanema.com.br/proxy/

67 PTR Pumpunhost - http://ptr.pumpunhost.com/glype/

68 Browser Feenex - http://browser.feenex.ru/

69 Direct products - http://directproducts.co.zw/errors.php

70 H4ck0r - http://h4ck0r.com/

71 Nice Trick - http://nicetrick.info/

72 Okmmproxy - http://okmmproxy.marketopedia.ru/

73 CRM Asiades - http://crm.asiades.net/proxy/

74 Online Proxy - https://www.onlineproxy.nl/index.php

75 Cstoolsnet - http://cstoolsnet.globat.com/

76 Free Place - http://freeplace.info/proxy/

77 China Grows - http://www.chinagrows.com/

79 V29 - http://v29.xf.cz/

80 Nice-Share - http://nice-share.com/ppp/

81 Proxy Nowhere Incoming - http://proxy.nowhereincoming.net/

82 Pdts - http://pdts.net/glype/index.php

83 Proxyhub - https://proxyhub.eu/

84 Unblock Everything - https://www.unblock-everything.com/

85 Unblock That Site - http://unblockthatsite.net/

86 New On Internet - http://newoninternet.dobrowsing.com/

87 England Proxy - http://www.englandproxy.co.uk/

88 Fast USA Proxy - https://fastusaproxy.com/

89 Proxy Free - https://www.proxfree.com/

90 Websurf - https://www.websurf.in/

91 Surf for Free - http://surf-for-free.com/

92 Proxify - https://proxify.com/ (3-day free trial)

93 Go Proxy - https://www.goproxy.asia/

94 US Proxies - http://usproxies.info/

95 Prox Me Call Me Names– http://www.proxmecallmenames.com/

96 Proxy 2014 - http://www.proxy-2014.com/

97 Ninja Cloak - http://ninjacloak.com/

98 PHP Proxy - http://www.phproxysite.com/

99 DeFilter - http://defilter.us/

100 Unlock My Web - http://www.unblockmyweb.com/

101 Hidester - https://hidester.com/proxy/

102 VPNBook - https://www.vpnbook.com/webproxy

103 Hide.me - https://hide.me/en/proxy

104 Whoer - https://whoer.net/webproxy

105 Zend2 - https://zend2.com/

106 BlewPass - https://www.blewpass.com/

107 F4FP - http://f4fp.com

108 TiaFun - http://tiafun.com

109 Unblock My Web - http://www.unblockmyweb.com/

110 Zfreez - http://zendproxy.com/

Free anonymizer it is convenient and easy to use, but for complete protection on the Internet (hackers, wiretapping, blocking on the network, or), I still recommend it.

Read about the full functionality of vpn in my blog and stay tuned for new articles.

Not all providers work in Russia and each of them has its own advantages and disadvantages.

The pricing range ranges from $ 2-10 for a monthly subscription, but there are several quality services that offer free samples. I also want to emphasize that almost all VPNs offer a money-back guarantee in case you don't like the service.

It is very important to choose the appropriate VPN exactly for your needs.

To save you time and money with a specially designed algorithm. The process takes no more than a minute, and most importantly, it does not require any personal data.

It processes your personal VPN requirements such as location, device, security level and selects the best option.

The main difference between VPN and anonymizer, as I have already mentioned, is the protection of privacy and the level of encryption.

If these aspects are of little concern to you, then the anonymizer is a sufficient solution for basic needs.

The main thing is not to forget, in order to achieve complete anonymity and hide your activity on the Internet, you should refrain from using the anonymizer. They are not very cryptographic, so use them at your own risk.

Anonymizers and VPN services

Anonymizers- these are special sites, programs or browser extensions that allow you to hide data about the user, his location and the software installed on his computer from a remote server.

  • Any traffic passing through the anonymizer (proxy server) will have its IP address instead of the address of the computer from which the request was made;
  • Unlike VPN servers, anonymizers (proxy servers) do not have any means of encrypting information passing through them.

VPN (Virtual Private Network) Is a technology that connects trusted networks, nodes, and users across open networks that are not trusted. That is, a VPN is a secure window to access the Internet.

VPNs were originally created to allow company employees to remotely access their corporate servers, regardless of their location. While a number of companies still use VPNs for this reason, most users use VPNs to gain privacy on the Internet or to be able to bypass geographic restrictions on access to various sites (such as streaming content).

When a user surfs the Internet without a VPN, their search history, location, and information about their ISP are available to advertisers, their employer, and government agencies. By and large, a VPN protects online information from being accessed by interested parties, but sometimes there can be leaks. VPN leaks can occur for a variety of reasons. Persons interested in obtaining personal information can use the code to disable the VPN, or sometimes the system may simply not work properly. When using a VPN for your daily Internet activity, it is recommended that you regularly check it for leaks.

A tunnel is created between the user's computer and the server with the software installed to create a virtual private network.

  • In these programs, a key (password) is generated on the server and on the computer to encrypt / decrypt data.
  • A request is created on the computer and encrypted using the key created earlier.
  • The encrypted data is transmitted over the tunnel to the VPN server.
  • On the VPN server, they are decrypted and the request is executed - sending a file, entering the site, starting the service.
  • The VPN server prepares the response, encrypts it and sends it back to the user.
  • The user's computer receives the data and decrypts it with the key that was generated earlier.

Risks and inconveniences for the user when using anonymizers and VPN services

  • Slower Internet connection speed than a normal connection
  • Possibility of leaking user data (logins, passwords, bank details, data of cards and payment systems) if the VPN is configured incorrectly, as well as when passing through the anonymizer.
  • Possibility of infecting the computer with viruses (through the insertion of malicious code during the passage of anonymizers).
  • The provider that provides the user with VPN services receives all information about the user's actions during his connection to the Internet

Is it possible to prohibit the use of VPN services from a single provider from a technical point of view?

  • Can recognize VPN traffic and block it, but this requires expensive equipment.
  • In the case of smartphones and tablets, you can also restrict access to VPN services according to the "Chinese model" - if Roskomnadzor agrees to exclude VPN services from mobile app stores

How users will bypass the law on anonymizers and VPN services

  • There are so many anonymizers and VPN services that blocking all these resources is unrealistic. You can always find an unblocked resource that does not fulfill the requirements of this law.
  • You can create your own VPN on a rented foreign site (this service may become popular in the next couple of years).
  • If the Apple Store and Google Market stop providing the ability to download those applications that do not comply with the requirements of this law, then users will start downloading them from alternative sources such as www.apkmirror.com, http://m.apkpure.com, http: // f -droid.org etc.

VPN Leak Types

Users usually subscribe to VPN providers thinking that the service they pay for will protect their online privacy. But the realization that VPNs can leak information can be scary and unsettling. There are three types of VPN leaks that can occur, and therefore being able to detect them will help users be prepared to fix any leaks they may find.

IP leak

An IP address is a dotted string assigned by your ISP to specific computers or smart devices. When you surf the Internet, your IP address is linked to your searches, clicks and visits.

There are currently two types of IP addresses. The original protocol is called IPv4 and the newer one is IPv6. The new protocol is designed to provide even more IP addresses in the world. Currently, many VPN service providers only support IPv4 addresses, which can lead to IP address leaks.

DNS leak

This is a very useful browser-based peer-to-peer (peer-to-peer) communication, but users have found that WebRTC opens up certain VPN vulnerabilities. Similar leaks occur in popular browsers such as Chrome, Firefox, Brave and Opera. With just a few lines of code, any site can reveal your IP address and location.

How do I know if my VPN is working?

There are many paid services that allow you to find out detailed information about potential vulnerabilities in your VPN. If you want to investigate your personal Internet security, you can check it yourself and manually.

How to check for IP leaks

  • Find your personal IP address by disabling your VPN and typing in a Google or Yandex search engine a query like “find out my IP address”. Your IP address associated with your device will be shown at the top of the page. Make a note of this address.
  • Go to your VPN provider's account, log in, select the required VPN server and connect to it.
  • Go back to the search engine and retype the query like "find out my IP address". Your new address will now be displayed on the screen. Check it against your IP address that you wrote down earlier.
  • If your new VPN address matches your non-VPN address, then there is likely a leak in your IP address.

How to check for a DNS leak

  • Connect to your VPN and select a server in a different country.
  • Open a site that is blocked for your country (for example, a social network, forum, or content streaming service).
  • If you are unable to access this website, then it is likely that there is a DNS leak.

How to check for a WebRTC leak

  • Turn on your VPN and choose any server to work with.
  • Type in your search engine (for example, Google or Yandex) a query like "find out my IP address". At the top of the page, you'll see your IP address associated with your device by your VPN service.
  • Now copy this IP address and paste it into the query field in your search engine, but just in front of the address itself, type “IP” (without the quotes). If your location is shown, it may indicate a WebRTC leak.

How can I fix a VPN leak?

If you find a leak in your VPN, then don't panic. There are several ways to fix the leak you are experiencing. If you find that these types of leaks are frequent, then consider changing your VPN provider and move to the one that is best suited to protect your online activity.

How to fix IP leak

A reliable solution to fix IP leaks is to use a VPN service that provides full support for both IPv4 and IPv6 addresses. You can also add IPv6-only restrictions in your firewall, but this is a temporary solution to the incident.

How to fix a DNS leak

If you find a DNS leak, there are several fixes that you can try. First, turn off your VPN and turn off your WiFi. After a minute, turn on your WiFi and reconnect to your VPN. If this does not help to resolve the incident, then try to select a different server for connection in your VPN. After that, run the DNS leak test again to verify the security of your connection.

How to fix a WebRTC leak

The best way to fix a WebRTC leak is to disable WebRTC in your browser. This can be done in Firefox and a number of other browsers. But Chromium browsers like Chrome or Brave don't have an option to disable WebRTC, so for those browsers, use browser extensions to protect your online privacy.

VPN Leak Prevention Tips

  • Use the tests above to check your VPN periodically.
  • Check that the VPN provider supports IPv6 addresses to avoid IP leaks
  • Check with your VPN provider and make sure your service does not allow any DNS leaks
  • Disable WebRTC in your browser or add an extension to prevent WebRTC leaks
  • Consider switching to a different VPN provider that offers complete protection against leaks and other vulnerabilities

Who is watching us?

We are watched by very, very many, from ordinary overly curious hackers, to the bigwigs of the world behind the scenes, and they all need something from us. Scammers with a lower rank need your passwords, ip - addresses, confidential information. The special services need to know everything about your preferences, whether you accidentally got out of the herd of sheep that they obediently manage, whether you visit those resources that you do not need to visit. Surveillance in the network has existed since its inception, and from that moment there is a constant struggle between the tracking systems and those who oppose them. Those who are trying to control us more opportunities, but with knowledge and the correct multi-level security system, you can solve any problem from ordinary surfing to effective underground.

Tracking tools can be conditionally divided into three levels, but it should be understood that each higher level uses the capabilities of the lower ones, so it looks more like a nesting doll.

1st level

Providers, Trojan bot networks, polymorphic viruses, rootkits. All these dangers in themselves are quite serious, but if they are not involved by higher-level systems, then they do not pose a particular danger, in terms of criticality for a person, of course, and not for a PC and data on it.

So what do they do:

Providers

They have access to all your data, collect all your registration data, cut the traffic of torrent networks, encrypted traffic. They do all this for their own commercial purposes, so it is not particularly dangerous, but much more dangerous is what they are doing in the framework of measures to ensure SORM - 2 and SORM - 3, and this is described below.

Trojan bot networks

They are a new type of Trojans that are integrated into networks, and it is the Trojan networks that are installed on most of the infected PCs around the world. The task of the Trojans that got on your PC is different, there are Trojans for fools that require you to deposit money for SMS and for this they will unblock you, but such a minority, modern Trojans are more cunning, they hide in very hard-to-reach places and do not manifest themselves in any way. Their main task is to collect data, namely your passwords, your visited pages, your documents. After he transfers this data to the owner of the network (and the average network is from 10,000 PCs), the owner of the network either sells your PC (more precisely, your IP) for spam or hackers, or uses your IP himself. Since you can't take anything from most PCs, the Trojans turn them into proxies for VPN servers and use them for spam or hacker attacks. But for us, the main danger of Trojans is not that they control our PC or steal passwords, but that they set you up in dangerous operations of hacking other people's servers, as well as other illegal activities. But even worse is that many botnet holders sell stolen data to level 2 and 3 systems, that is, they leak all your data to the special services for a penny, and they turn a blind eye to their activities in response.

Polymorphic viruses

The main danger is that they are difficult to detect, in our case it is also the fact that they can be written specifically for a specific site, or for your network, or for your protection system, and not one antivirus will calculate such specially sharpened polymorphs (Polymorphism) ... It is polymorphs that guard SORM and Echelon are "government programs", they are not detected by ordinary antiviruses and firewalls, they are installed by the provider and have the ability to penetrate your PC at any time. Infection channels are usually provider's home pages, billing, Personal Area... It is naive to think that you can ignore this, because if they could not break the communication channel for you, then they will scan your ports and try to penetrate your PC. State polymorphic programs are not malicious, the only thing they do is tell the person who installed them all your actions on the network and passwords, they record your activity on the PC. The SORM system has a department that develops such polymorphs, if you are not an extra-class hacker, you cannot avoid infection with a polymorph specially written for you. But there is also opposition to this.

Rootkits

Rootkits are actively used by special services in conjunction with polymorphs. They are a process that hide Trojans and bookmarks from you, are not detected by antiviruses and anti-Trojans, and have complex heuristic polymorphic algorithms.

Division K

The user tracking aspect

Entering the network, a person immediately comes under the scrutiny of tracking systems. In our case, SORM - 2, your provider who provides you with access to the network, allocates you an ip or your temporary or permanent address.It is thanks to ip that the interaction between your browser and the server takes place, thanks to which you get the information that you see on the monitor.

The peculiarity of network protocols and programs is that all your ip is written in the logs (protocols) of any server you visited and remain there on the HDD for a long time, unless of course they are specially erased from there.

The provider has its own ip range, which is allocated to him, and he, in turn, allocates ip to his users. The provider has its own databases of ip addresses, each ip address in the database is tied to the name of the person who signed the contract and the physical address of the apartment where the access point is located.

IP can be dynamic (change constantly, or static, that is, constant, but this does not change the essence of the matter, the provider constantly writes your movements. The provider knows on which resource, at what time and how long you were.

All the resources you visited, and he writes at time intervals from 15 minutes to 1 hour, he writes to his database, when you go to any new resource, it is also recorded (resource ip). These data are provided in the database in the form of numbers and do not take up much space. The database of your logs is kept by the provider under the law for 3 years, and by tacit agreement with the people from SORM - 2 for 10 years.

This is one of the conditions of SORM-2, without which no provider will receive a license from FAPSI to provide telecommunications services. Thus, the archive of all ip issued to you for 10 years is stored by the provider, as well as the archive of all your logs (where, when and what time you "surfed" on the network) SORM through special equipment has direct access to these databases, and in the SORM system 3, these data are generally directly integrated into this global system.

If, for example, you are interested in the SORM operator, he simply activates one button in the program and the SORM system begins to write all your traffic, everything that you have transmitted, downloaded and watched, simply by using a hardware sniffer scanner on the provider's channel. Physically, the data will be stored by the provider, from where they are transmitted for analysis to the SORM operator. I would like to note that as a rule, all your traffic is UNECRYPTED and, if desired, anyone can intercept it, not only SORM - 2.

SORM - 2 also installs traffic analyzers on the providers' channel, they view information on a set of keywords, on visited resources, on the presence of encrypted traffic, and in all these cases, a message is sent to the system, which automatically decides what to do next. What is the global level of control, I think it is clear and draw conclusions what kind of compromising evidence is available for everyone. If the contract is signed for your grandmother, then do not think that operational development will be carried out in relation to her, the SORM databases are connected to the database by registration and the central FSB base and SORM bases on other resources, and you are associated if necessary, there are no fools sitting there.

SORM - 2 on search engines, is directly integrated into the database and scans ALL your hits for keywords, and also uses ALL your settings for cookies that the search engine collects. If necessary, compiles a "picture" of a particular user by keywords and specific search queries, remembers passwords and logins.

SORM - 2 on all major social portals collects mainly your information that you leave and logs page visits, remembers passwords and logins.

SORM - 2 in mail servers perlustrate all your mail, associates your ip from which you registered this mail. Analyzes and gives a signal if encrypted PGP correspondence is detected.

SORM - 2 in e-commerce systems completely scans your PC, is registered in the registry, binds to the MAC address, the serial number of the equipment, to the system configuration and ip, and of course to the data that you left during registration. Of course, all this is done by an e-commerce program, but the information that it receives is available to SORM.

SORM 2 in VPN and proxy servers

Not at all, of course, but at many (legal at all), writes logs. A very big problem is the unreliability of the proxies themselves, many proxies in the SORM-2 system, the rest of the official legitimate servers and by law issue all the logs of interest to the SORM-2 operatives. That is, even though you will work through 1 or through 100 proxy servers, you will be promoted very quickly, you just need to call the owner of the service or come. Exotic countries will only increase the search time for your ip (but, if required, they will do it quickly). It is through the promotion of the proxy chains that most of the hackers are caught. All proxy servers write LOGS, and this is live compromising evidence (except for specially configured ones).

SORM - 2 in Data Centers

SORM-2 is also integrated into all data centers and traffic communication points, if the servers and, accordingly, the hosting are located in Russia, which means that you can get an archive of logs and put a trojan to the database of registered users only by calling or visiting the data center, it is in this way that most patriotic sites are monitored in hardware, as well as VPN servers or resources on which SORM - 2 is not installed directly in the form of equipment. Your admin can re-encrypt his database at least 100 times, but if he has a Trojan on the server in the data center and the channel is tapped, then if he wants to, he will not save user logs, their addresses, or other confidential information. Their own server will only complicate their task. For security, you need your own server and your own person in the data center, and preferably in data centers abroad.

SORM - 2 on servers of domain name registrars

Keeps track of who and what registers, writes ip, automatically breaks through the reality of the entered data, if it is determined that the left data - the domain name is put on a note, if necessary, they can easily close the domain name. SORM - 2 also uses a whole network of TOR servers (like other special services) that listen to traffic passing through them.

Level 3

Echelon

Echelon is an order of magnitude much cooler system than SORM-2, but with the same tasks and goals, all lower levels 1 and 2 are used by the official owner of the CIA, is on Google built into Windows in the form of bookmarks, on all routers, in the largest date centers of the world, on all main optical cables, it differs in scale and in that, if desired, the operator uses the satellite and watches you on the monitor in real time, the FSB does not have direct access to it, although it can get it on request, although its principles are the same. By and large, Echelon is a global global SORM-2, this system has much more opportunities and finances around the world. The system controls banking transactions, has the ability to open encrypted messages and communication channels, interacts very closely with Microsoft and Skype.

What's the difference between VPN and proxy?

When you delve into the network settings of your computer or smartphone, you often see options labeled `VPN` or` Proxy`. Although they do some of the same work, they are very different. Our article will help you understand what is the difference between them and what they are for. You might want to use some of them.

What is a proxy?

Usually, when you browse the Internet, your computer connects directly to that site and starts downloading the pages that you are reading. Everything is very simple.

And when you use a proxy server, your computer first sends all web traffic to it. The proxy redirects your request to the required site, downloads the relevant information, and then sends it back to you.

Why is all this necessary? There are several reasons for this:

  • You want to browse sites anonymously: all traffic that comes to the site comes from the proxy server, not from your computer.
  • You need to overcome filters restricting access to this or that content. For example, as you know, your Netflix subscription in Russia will work in. But if you use a proxy server from Russia, it will look like you are watching TV while in Russia, and everything will work as it should.

While this scheme works reasonably well, there are several problems with proxies:

  • All web traffic that goes through the proxy can be viewed by the proxy owner. Do you know the owners of the proxy server? Can you trust them?
  • Web traffic between your computer and the proxy server, and between the proxy server and the website is not encrypted, and therefore an experienced hacker can intercept the transmitted confidential data and steal it.

What is VPN?

VPNs are very similar to proxies. Your computer is configured to connect to another server, and your web traffic is routed through that server. But if a proxy server can only redirect web requests, then a VPN connection is capable of routing and providing complete anonymity of all your network traffic.

But there is another significant advantage of VPN - all traffic is encrypted. This means that hackers cannot intercept data between your computer and the VPN server, and therefore your sensitive personal information cannot be compromised.

VPN is the safest option

The lawyer of the Center for Digital Rights, Mikhail Bautin, representing inCloak Network Ltd, submitted a written response to the claim to the court. In the response, the defendant asked to reject the claim. Such data are contained in the determination of the Medvedevsky District Court of the Republic of Mari El, writes Roskomsvoboda. Another representative of inCloak Network Ltd, designated as V.K. Ivanov, did not object in court to the termination of the case.

As a result, the court accepted the refusal of the assistant prosecutor, terminated the proceedings and informed the parties that the proceedings on the same subject and on the same grounds in the future would not be possible to resume.

VPN service of "Kaspersky Lab" began to block sites banned in Russia

In early July 2019, it became known that the VPN service Kaspersky Secure Connection began blocking sites prohibited in Russia. The service was connected to the registry of prohibited information to filter user access to resources located in it.

Avast closes VPN service in Russia due to Roskomnadzor restrictions

On June 13, 2019 it became known about the closure of the Avast SecureLine VPN service in Russia due to the restrictions of Roskomnadzor. The agency requires VPN services and anonymizers to block access to blacklisted sites and prevent users from visiting these resources.

Roskomnadzor forced to unblock world famous VPN service

The HideMy.name project, one of the largest VPN services, formerly known as HideMe.ru, has achieved the cancellation of the blocking decision in the Supreme Court of the Republic of Mari El, as reported by the agency's portal. HideMy.name was added to the register of prohibited sites, which is supervised by Roskomnadzor, in July 2018, based on the decision of the Yoshkar-Ola district court. The lawsuit was filed by the local prosecutor, however, which is noteworthy, the respondents were not representatives of the resource at all, but employees of Roskomnadzor.

The judge's decision to add HideMy.name to the list of sites blocked by Russia was influenced by the theoretical possibility of each user of this service gaining unlimited access to extremist materials, including Adolf Hitler's book Mein Kampf. In addition, the representatives of the resource replied that the claim referred to a certain anonymizer, which was absent on the website at the time the case was initiated.

The verdict in this case was challenged on May 23, 2019 in the Republican Court of Mari El by the joint efforts of HideMy.name representatives, as well as lawyers from Roskomsvoboda and the Center for Digital Rights. The court completely reversed the earlier decision, but, nevertheless, sent the case for reconsideration.

VPN services refuse to join FSIS

International companies providing VPN services are not ready to fulfill the requirements of Roskomnadzor to connect to the Russian register of prohibited sites to filter traffic, Roskomsvoboda reported at the end of March 2019. It is clarified that the only exception was the Russian VPN service from Kaspersky Lab, which announced that it would comply with the law.

Roskomsvoboda monitors the situation and maintains the current state of the list of services that have already responded. The list currently looks like this:

  • TorGuard - on the RKN list, refusal + removes servers from the Russian Federation;
  • VyprVPN - in the RKN list, refusal;
  • OpenVPN - on the RKN list, refusal;
  • ProtonVPN - not on the RKN list, refusal;
  • NordVPN - on the RKN list, refusal + removes servers from the Russian Federation;
  • Private Internet Access - not on the RKN list, refusal;
  • Trust.Zone - not on the RKN list, refusal + removes servers from the Russian Federation;
  • VPN Unlimited - on the RKN list, refusal;
  • Kaspersky Secure Connection - on the RKN list, consent;
  • Hide My Ass! - ignore;
  • Hola VPN - ignore;
  • ExpressVPN - ignore;
  • Windscribe - not on the ILV list, disclaimer;
  • Ivacy VPN - not on the RKN list, refusal;
  • TgVPN is not on the RKN list, refusal, basically does not have servers in the Russian Federation.

That is, out of twelve answers - eleven refusals, in three cases the intention to remove servers from the Russian Federation is voiced

Connection requirements were sent to 10 services: NordVPN, Hide My Ass !, Hola VPN, Openvpn, VyprVPN, ExpressVPN, TorGuard, IPVanish, Kaspersky Secure Connection, and VPN Unlimited. Of these, only Kaspersky Secure Connection agreed to the requirements of Roskomnadzor;

Roskomnadzor requires VPN services to start blocking prohibited sites

2018

Trend Micro Warns of the Dangers of Using Hola VPN

One of the most popular free VPN services, with millions of downloads, poses a privacy threat by not properly hiding users' digital fingerprints, researchers warn.

We are talking about the Hola VPN service, which has about 175 million users worldwide. Hola VPN has a number of serious security issues, according to a new report from Trend Micro, one of the main being the lack of encryption.

In particular, during an active session, the connection to the super node is not encrypted, and an attacker can intercept the transmitted traffic using a man-in-the-middle attack. In addition, the lack of encryption can lead to leakage of IP addresses, which can be used by the authorities to track citizens in countries with a totalitarian regime.

When, while using Hola VPN, a user opens a new tab in the browser or enters a domain name in the address bar, the resource is accessed directly from his real IP address. Unlike other VPN services that route traffic through an encrypted tunnel, Hola VPN is not a secure VPN solution, but rather an unencrypted web proxy.

Trend Micro now detects Hola VPN as Potentially Unwanted Software and recommends that users remove it from their systems. In turn, the manufacturer called the company's report "irresponsible."

Apple bans individuals from writing VPN apps for iPhone and iPad

The global regulation of rules for publishing applications has also undergone a major update, which tightens and describes in more detail the provisions related to the protection of user privacy. In particular, clause 5.1.1 of the rules for publications on the collection and storage of user data (5.1.1 Data Collection and Storage) has increased from four to seven sub-clauses.

The App Store Review Guidelines have been updated based on the App Store censors' work over the past few months, during which the apps have been subjected to the most rigorous scrutiny, providing users with anonymous access to Internet resources.

From now on, hosters are obliged to report to the authorities about the owners of proxies and VPNs.

The State Duma adopted in the third reading a law on penalties for hosters and search engines regarding means of bypassing blocking on the Internet. The law, which will enter into force 90 days after its official publication, is a set of amendments to the Code of Administrative Offenses of Russia.

Fines will be levied on hosting providers that provide online means of bypassing blocking, and do not inform Roskomnadzor who owns these funds.

Alternatively, instead of submitting data about the proxy or VPN owner to Roskomnadzor, the hosting provider can inform the regulator that he has notified this owner about the need to provide information about himself. If such a message has not been received from the hoster, he will also face a fine.

In both these cases, the fine for citizens will be from 10 thousand to 30 thousand rubles, and for legal entities - from 50 thousand to 300 thousand rubles.

Search engine penalties

The law also provides for penalties for search engines that make it easier for users to access Internet resources blocked in Russia. In particular, if the operator of the search engine has not connected to the federal state information system, which contains information about which resources are blocked, then such an operator will be fined. For citizens in this case, the fine will be from 3 thousand to 5 thousand rubles, for officials - from 30 thousand to 50 thousand rubles, and for legal entities - from 500 thousand to 700 thousand rubles.

The State Duma approved in the II reading the tightening of liability for anonymizers

The State Duma adopted in May 2018 in the second reading a bill providing for the introduction of administrative fines for violating the law on anonymizers. In particular, if the hosting provider and the anonymizer do not provide Roskomnadzor with data on the owners of the means of access to blocked sites, this will result in a fine - from 10 thousand to 30 thousand rubles for citizens and 50 thousand - 300 thousand rubles for legal entities, writes Interfax.

In addition, the issuance of links to prohibited sites in search engines will result in a fine. For this, it is proposed to charge 3 thousand - 5 thousand rubles from citizens, 30 thousand - 50 thousand rubles from officials and 500 thousand - 700 thousand from legal entities.

VPN service rating

23% of VPNs expose users' real IP addresses

Italian researcher Paolo Stagno tested 70 VPN services and found that 16 of them (23%) expose users' real IP addresses. The problem is related to the use of WebRTC (Web Real Time Communication) technology, which allows making audio and video calls directly from the browser. This technology is supported by a number of browsers, including Mozilla Firefox, Google Chrome, Google Chrome for Android, Samsung Internet, Opera and Vivaldi.

WebRTC is an open standard for real-time multimedia communication that runs directly in a web browser. The project is intended for organizing the transfer of streaming data between browsers or other applications that support it using point-to-point technology.

As the researcher explained, the technology allows using STUN (Session Traversal Utilities for NAT) and ICE mechanisms to organize connections in different types of networks. The STUN server sends messages containing the source and destination IP addresses and port numbers.

STUN servers are used by VPN services to replace the local IP address with an external (public) IP address and vice versa. WebRTC allows sending packets to a STUN server, which returns a "hidden" home IP address, as well as the user's local network addresses. The IP addresses are displayed using JavaScript, but since the requests are made outside of the normal XML / HTTP procedure, they are not visible from the developer console.

According to Stagno, 16 VPN services expose users' real IPs: BolehVPN, ChillGlobal (plugin for Chrome and Firefox), Glype (depending on configuration), hide-me.org, Hola! VPN, Hola! VPN (plugin for Chrome), HTTP PROXY (in browsers with Web RTC support), IBVPN, PHP Proxy, phx.piratebayproxy.co, psiphon3, PureVPN, SOCKS Proxy (in browsers with Web RTC support), SumRando Web Proxy, TOR (working as PROXY in browsers with Web RTC), Windscribe. A complete list of tested services can be found here.

2017

A number of VPN services refused to cooperate with Roskomnadzor

According to the public organization Roskomsvoboda, not all VPN services intend to follow the law that has come into force. Seven services have already clearly stated their position on the new requirements. The first is ExpressVPN, which announced back in the summer that it would "certainly never agree to any regulation that would jeopardize a product's ability to protect users' digital rights."

Service ZenMate prepared in advance for a possible blocking in case of refusal to restrict access to sites prohibited in the Russian Federation. The company announced an "elegant solution" that allows the service to automatically switch to "steady state" without causing significant inconvenience to users. “In this mode, the connection will be redirected through the largest backbone Internet services. These services play a key role for the Web, and therefore blocking them paralyzes the Internet, ”the company said in its blog.

Services Tunnelbear and PrivateVPN do not intend to comply with Russian law, since they are not Russian companies. Tunnelbear servers are located outside the Russian Federation, and PrivateVPN is ready, if necessary, to transfer its server from the territory of Russia.

The refusal to cooperate with Roskomnadzor was also announced Golden frog(the company owns the VyprVPN service), TorGuard and TgVPN... “We will not comply with this law and will do our best to remain accessible to users from Russia. Among other measures, we are preparing applications with built-in VPN blocking bypass methods, ”the TgVPN team said in their Telegram chat.

The law on anonymizers came into force in Russia

To enforce the law, the federal state information system (FSIS) is launched. At the request of law enforcement agencies, Roskomnadzor will identify a provider that provides technology to bypass blocking.

The law will need to be implemented upon appeals to Roskomnadzor of the federal executive body carrying out operational search activities or ensuring security Russian Federation(Ministry of Internal Affairs and FSB).

As reported on Roskomnadzor's VKontakte page, the agency and market participants - Kaspersky Lab, Opera, Mail.ru and Yandex - are already completing testing of the "new interaction system". In addition, the anonymizers 2ip.ru and 2ip.io have already agreed to cooperate with Roskomnadzor.

The draft law was introduced by deputies Maxim Kudryavtsev (United Russia), Nikolai Ryzhak (Fair Russia) and Alexander Yushchenko (Communist Party of the Russian Federation).

Fines for violation of the law banning anonymizers

The State Duma is going to legislate fines for search engine operators if they do not fulfill their responsibilities to gain access to the Roskomnadzor register and block links to information resources included in the list.

The document provides for a fine for individuals - 5 thousand rubles, for officials - 50 thousand, for legal entities from 500 thousand to 700 thousand rubles.

Tor creator explained how Roskomnadzor can block Tor

Roskomnadzor requirements for anonymizers

The law prohibits search engine operators from displaying links to blocked resources on the territory of the Russian Federation. A similar ban is provided for owners of anonymizers and VPN services. Sites that report on ways to bypass blocking will, in turn, be blocked by Roskomnadzor. In addition, on the basis of requests from the Ministry of Internal Affairs and the FSB, the department will determine the provider that allows the use of the anonymizer and request data from him to identify the owner of the service. The provider will have three days to provide the necessary information.

As specified, the requirements of the law do not apply to operators of state information systems, government agencies and local authorities, as well as to those cases of using anonymizers when the range of their users is predetermined by the owners and their use is “for technological purposes of ensuring the activities of the person using it”.

If the bill is approved by the Federation Council of the Federal Assembly of the Russian Federation and signed by the President of Russia, most of the provisions of the document will come into force on November 1, 2017.

The Ministry of Internal Affairs and the FSB of Russia can start identifying ways to bypass blocking on the Internet

If adopted, the law will enter into force on November 1, 2017. On the same day, the procedure for identifying anonymizers and requirements for methods of restricting access to them will come into effect.

As specified, the bill does not affect operators of state information systems, government agencies and local authorities, and also does not apply to non-public means of bypassing locks if they are used "for technological purposes of ensuring the activities" of the organization, and the circle of their users is predetermined.

As the publication emphasizes, we are talking about blocking the FTS of sites with casinos, however, anonymizers are more widely used. In addition, the State Duma is currently considering a bill banning anonymizers, VPN and similar services to bypass blocking. So far, the document has only passed the first reading. In view of this, the lawyers-interlocutors of the publication call the new order illegal - since it gives the FTS the right to block not only online casinos, but also the very opportunity to enter an online casino.

Deputies banned anonymizers and search engines from giving access to prohibited sites

At the end of June 2017, the State Duma approved in the first reading a bill on regulating the activities of services designed to gain access to Internet sites bypassing official blockings, as well as on excluding links to blocked resources from search engine results. The authors of the bill were deputies Alexander Yushchenko (Communist Party faction), Nikolai Ryzhak ("Fair Russia") and Maxim Kudryavtsev (" United Russia») .

The document is an amendment to the law "On Information, IT and Information Protection". The bill introduces obligations for "owners of information and telecommunication networks, information networks and computer programs, as well as owners of information resources, including sites on the Internet, designed to gain access from the territory of Russia" to networks and programs.

This definition should include services that provide the ability to indirectly access Internet resources: anonymizers, proxy servers, VPNs, tunnels, browsers with "bypassing" access (Tor, Opera, Yandex.browser), etc. Such services were originally intended to access the Internet while hiding their IP address, but after the introduction in Russia in 2012 of the Registry of Banned Sites, they gained massive popularity to bypass such restrictions.

What will happen when Roskomnadzor finds the anonymizer

The bill assumes that Roskomnadzor, the agency that maintains the Register of Banned Sites, will monitor this kind of services and include them in a separate register. The owners of the respective resources will be given access to the Registry of Prohibited Sites, and they will have to block access to such sites for Russian users.

When Roskomnadzor discovers an anonymizer or other similar resource, it will send a request to its hosting provider to obtain the contact information of its owner. The hosting provider will have to respond with the information within three days. Further, Roskomnadzor will send a request to the owner of this resource to include it in the aforementioned register. If the owner does not respond to Roskomnadzor within 30 days and does not take measures to block access of Russian users to prohibited sites, the department will block access to it from the territory of Russia.

New responsibilities for search engines

In addition, the bill introduces an obligation for the owners of search engines to exclude from the search results links to resources that have entered the Registry of Prohibited Sites. Search engine owners will also be given access to the Registry of Prohibited Sites.

At the same time, fines for violators are introduced into the Code of Administrative Offenses. For owners of search engines for not gaining access to the Registry of Banned Sites and for failing to filter links to prohibited resources, fines will be p5 thousand for individuals, p50 thousand for officials and from p500 thousand to p700 thousand for legal entities. For owners of anonymizers and other similar services, fines for not providing Roskomnadzor with information about themselves will amount to fines from p10 thousand to p30 thousand for individuals and from p50 thousand to p300 thousand for legal entities.

CSIRO: VPNs aren't always as private as they think

The Australian organization CSIRO (Commonwealth Scientific and Industrial Research Organization) has warned users of virtual private networks (VPN) that their security often does not live up to the name of the technology.

Researchers at this organization found that 18% of the apps viewed do not actually encrypt user traffic, 38% inject malware or intrusive ads directly onto the user's device, and more than 80% request access to sensitive data such as user accounts and text messages.

16% of VPN applications analyzed use opaque proxies that modify user HTTP traffic by inserting and removing headers or using techniques such as image transcoding.

In addition, two VPN applications were found to actively inject JavaScript into user traffic to distribute advertisements and track user activity, and one of them redirects ecommerce traffic to external advertising partners.

“The main reason tens of millions of users install these applications is to protect their data, but this is precisely the function these applications do not fulfill,” the report says.

While most of the apps we surveyed offer "some form" of online anonymity, CSIRO reports that some app developers deliberately seek to collect personal information from users that could be sold to external partners. However, only less than 1% of users show any concern about the relative security and privacy of using these applications.

18% of VPN applications surveyed use unencrypted tunneling technologies, and 84% and 66% of applications leak IPv6 and DNS traffic, respectively. As a result, the report says, these applications do not protect user traffic from agents deployed along the path that monitor or spy on users online.

If you look at the official descriptions of applications on Google Play, 94% of applications with IPv6 and DNS data leaks are said to protect personal information.

Before publishing its report, CSIRO contacted developers in whose applications security flaws were found, and as a result, some of them took steps to eliminate vulnerabilities, and some applications were removed from Google Play.

Due to the regular blocking of sites, users began to look for workarounds. This issue is especially relevant for residents of Ukraine, where access to classmates, VK, Yandex and many other resources is limited. Anonymizers can help you bypass, they help you change the IP address and go to any sites. These can be both special programs that are installed on a computer, and online resources (Internet sites) and are used to hide information.

Anonymizers also help office workers visit resources that are blocked at the company's network level, and also make you less vulnerable to hackers. Let's figure out in more detail where to download the anonymizer for free and how to use such a program.

Types of anonymizers

The anonymizer allows you to hide the external IP so that the user cannot be traced. At the time of operation, the program replaces it with another address, which allows you to hide the identity of the user, it is impossible to calculate from which city he entered the site. Most often, these utilities are used to bypass locks at different levels.

Such software can be divided into several types:

  • utility installed on a PC or mobile device;
  • add-on to web browsers;
  • remote proxy server;
  • online service that does not require the installation of components on a computer.

The last option is the most convenient to use. It is used by office workers, students and schoolchildren. It is enough to enter the desired address in the PC search bar to switch to using the anonymizer. However, such services are limited in their capabilities. With their help, you can bypass blocking at the organization level, but it will be impossible to open sites from the list of prohibited.

Principle of operation

In order to hide the real IP of the user, the anonymizer contacts a proxy server or a web proxy. They submit a request to the desired site already on their own behalf, picking up a free IP registered in another country.

After receiving a response from the site to which the user sent the request, it is sent to the user's PC. Thus, the external IP of the computer is not read by the site, only the provider and the proxy server know it.

This is a simple explanation of how the anonymizer works, at the software level everything is much more complicated, but for the user it does not matter. The main thing is the result, you remain anonymous on the network, and you can also bypass any blockages.

Russian anonymizer "Chameleon" for classmates, VK and any other sites

Free Russian anonymizers have gained the greatest popularity among users. Their advantage is that they work with sites blocked by Roskomnadzor, and the instructions for use are as clear as possible. One of the popular services is Chameleon. It is a portal from which you can get to any site blocked by the system administrator. It is often used by office workers.

The advantage is that the time for using the service is not limited. When using this option, in a special line you need to enter the address of the site you want to go to, or you can choose one of the ready-made options (the list contains social networks and dating services).

After going to the site in the address bar, you can see a set of characters, no need to be scared - this is normal, this is how this service works. You need to enter your registration details and enjoy using the blocked site.

Access to social networks for Ukrainian users

Anonymizers from Russian developers can also be used by Ukrainian users, but the convenient service anonym .in .ua will help to bypass specific blocks - it is located on the Ukrainian domain, which allows you to use it without speed and time restrictions.

Its advantage is that from the main page of the site you can get to all the necessary portals:

  • Youtube;
  • Yandex;
  • Mail.ru;
  • dating services;
  • "Classmates".

You can use Odnoklassniki through an anonymizer for Ukrainian users free of charge by clicking on the login button right under the site logo. According to the test results, the pages of any social networks are recalled almost instantly. The exchange of information through this anonymizer is carried out as quickly as possible.

Best anonymizers

There are a lot of services and programs for using the network anonymously. Some stop working over time, while others are especially liked by users for additional options. We will tell you how to use the anonymizer for free and without restrictions, as well as give examples of services distributed by subscription. The rating contains all the best anonymizers.

Security Science

SECURITY-SCIENCE.COM is an online service compiled by security professionals. It allows you to select a remote server in several countries around the world. In addition, you can select a server located in a specific city in the country. For example, in the United States, it is proposed to carry out remote access from Illinois, Maryland, California.

In addition, on the site you can find other useful utilities for the security and optimization of your computer: decoders, programs for checking domains, and many others. All of them are collected by experts from leading companies.

OrangeProxy

This anonymizer is suitable for beginners. It has a very simple navigation that will allow you to open any site. The disadvantage of this service is the lack of Russification. To get the right settings, you need to know the basic terms.

You can do without additional settings. It is enough to select one of the icons at the top to get to the desired site, or enter the portal address in the search bar. Above it, you can see through which server the connection will be organized. The most commonly used remote servers are from the United States.

Xitenow

This free anonymizer inspires trust at first sight. It is decorated in green colors. The service is inconvenient due to the lack of icons for quick access. Browser type settings are shown in white, which also causes additional inconvenience.

At the same time, if you are not going to regulate the service for yourself, it is easy to use it. Just like in "Chameleon", you need to enter the address of the desired site and go to it. Next to the "Go" button there is a link to the settings of the remote server.

4Ever Proxy - anonymizer online

Another free site that can be used by office workers to bypass corporate network locks. A useful benefit of this site is that it cleans up user data every 2 hours. All sessions and registration data are completely erased.

In all other respects, this service is similar to the others. All data in it is individually encrypted, which allows you to maintain complete confidentiality. The service allows you to get access to almost all sites blocked from outside.

Hidester

This service is available in two versions - a site that allows you to open any blocked resource and an add-on for Google Chrome - Hidester Proxy. The latter option is more convenient if you use the anonymizer at home.

You don't need to visit the Hidester page every time to access social media. The installed extension will change your IP and you will be able to surf the network without restrictions.

In addition to external blocking, this service allows you to bypass the internal one, which is performed by the firewall. It is enough to enter the website address so that you can start enjoying all the benefits of free surfing.

NewIPNow

A feature of this service is that you yourself can choose from which IP you will enter the blocked resource. On the main page of the service there is a blue window, which lists the available addresses and the degree of their load. Choose those options that are working beyond their limits to ensure fast surfing.

On the top line of this blue screen, you must enter the address of the site you want to visit. This will allow you to open any blocked resource. Please note that the servers of this service are located in different countries of the world, you can opt for any.

Zalmos Web Proxy

This service is handy to unblock access to Youtube videos that are not available in your region. It is often used by mobile phone users on different operating systems. There is no need to install third-party applications, just use the quick link from the main page of the service.

It will also open the VKontakte anonymizer for free, give you access to many other sites. There are more than 10 direct links to popular resources under the search bar. Access to them is configured automatically, you do not need to delve into the intricacies of the proxy.

Avast! SecureLine VPN

A well-known antivirus utility manufacturer also offers you its own. It will need to be installed on your Windows computer, there is also mobile app for IOS or Android. The disadvantage of this anonymizer is the lack of a free version. You must subscribe for a year.

If you use multiple devices and want to protect them with this program, then you will need to purchase a subscription for each separately. After payment, you will not be limited in traffic - you can surf as much as you like.

CyberGhost

This VPN connection service works with all operating systems, which is very convenient. For rare operating systems, you will have to purchase a paid version, and without paying you can use the assembly for Windows, MacOS and Android. There are no traffic restrictions on the free plan.

The developers point out that the free client will add ads to the sites you visit, but there is very little of it and it is unobtrusive. In most cases, you won't even notice it. The paid version features faster servers, but the discounted rate is also handy for streaming video and surfing. No delays were found during testing.

PrivateTunnel

To redirect traffic to your own servers, you need to install the PrivateTunnel client, this is one of the most reliable VPN applications. It can be installed on the main PC operating systems and on mobile devices... This application can be used not only on a home network, but also with an unsecured connection via public Wi-Fi.

The disadvantage of this application is in traffic restrictions - you can use only 500 MB per month for free, and you will have to pay extra for everything above. There are several tariffs: for 50 and 500 GB. The VPN channel turns on quickly enough to save packet traffic. If you do not need an anonymizer, you can disable it, which will also allow you not to spend megabytes.

Browsec

This anonymizer is an extension that can be installed on Google Chrome, Mozilla Firefox and iOS mobile devices. It is completely free and redirects traffic through servers located in different parts of the world.

The advantage of this extension is that it is fast and does not insert additional ads on sites. For those who need speed, there is a paid version of this extension. It allows traffic to be redirected through proxy servers at high speed.

However, you don't have to pay to use this extension. In testing, the free version showed good results, delaying the response of sites by just a split second. Minor hitch occurred only when playing streaming video. There were no distortions and work difficulties on complex sites.

friGate CDN

It is one of the best anonymity extensions installed on Google Chrome, Mozilla Firefox and Opera browsers. Its advantage is that the extension database contains all the sites blocked by the decision of government agencies, it can automatically turn on when you go to prohibited addresses.

You can also adjust the settings to remain permanently anonymous or manually enable the extension. Among the options of this extension: the ability to change the proxy server manually, enable enhanced anonymity, speed up page loading using Google PageSpeed ​​technology. By default, the extension will enable ads on the sites you visit, but you can turn them off for free.

This is not a complete list of anonymizers that you can use to visit blocked sites and keep your incognito on the Internet. You can add your favorite clients, services and extensions to the list in the comments. Ask any questions, share information with your friends.