Question

1.Search the Internet for different methods on how to achieve anonymity when sending email. 2.Describe about...

1.Search the Internet for different methods on how to achieve anonymity when sending email.

2.Describe about the options you found . Show proofs of your experimentation.

3.Clearly discuss the results. Outline any limitations of the systems

4.Conclusion

Homework Answers

Answer #1

The options found on different methods on how to achieve anonymity when sending email are:-

1. Use A Burner Email Account - An Email account that you don't regularly use and is created to be used few times.

Using a webmail account like G-mail to send an anonymous email is a great option. You can sign up for a G-mail account without providing any identifying information. Afterwards, you can use that email address as a burner account.

Furthermore, when you send an anonymous email from G-mail, the originating IP address (where the email came from) in the email header is a Google server address, rather than your IP address. The change in IP address gives you another level of anonymity.

2. Use A VPN - A VPN routes your internet traffic through an external proxy connection, which hides your IP address and prevents your internet service provider from tracking you.

3. Install TOR on a thumb drive. TOR is an anonymous internet browser that passes your internet connection through a series of network connections called nodes. This obscures your IP address.

4. Use an anonymous operating system. If you're using Windows 10, macOS, Android, or iOS, you online activity may be tracked by other accounts you are logged into or advertising companies. To avoid being tracked by third-party apps, you can use an anonymous operating system. Many Linux distributions, such as Tails are designed to be completely anonymous.

5. Use AnonEmail AnonEmail is an anonymous email service by AnonyMouse. The AnonEmail service allows you to send anonymous emails using a series of nodes. When you send your email using the service, it bounces through several random nodes, making it impossible to trace back to your IP address.

Limitations and Results of the Methods.

1. Use A Burner Email Account - Google or your email provider can still track you, even if you make a new account. But, it will be difficult for the receiver of the Email to track you by your burner Email.

2. Use A VPN - A VPN perfectly assigns you a private network, you can spoof your location easily. It will help in bypassing cross border laws.

3. Install TOR on a thumb drive. TOR is an internet browser, the Tor project is open source and it is not so reliable for dealing with confidential data.TOR also can trace your IP address.

4. Use an anonymous operating system. If you're using Windows 10, macOS, Android, or iOS, you online activity may be tracked by other accounts or the corporations controlling these Operating Systems. Downloading an Operating System will help you with your animosity. It is cumbersome to install an operating system. It is not advisable to use third part Operating systems while dealing with confidential data.

5. Use AnonEmail AnonEmail is an anonymous email service by AnonyMouse. The AnonEmail service allows you to send anonymous emails using a series of nodes. When you send your email using the service, it bounces through several random nodes, making it impossible to trace back to your IP address. To fully use AnonEmail services you must pay. Payment is required for many essential features.

Conclusion.

By looking at all the experimentation,results and limitations I conclude that Tor web browser with VPN and Burner Email is a very secure way of sending Email Anonymously. By using TOR your operatng system privacy will be maintained. By using VPN, your IP address and your location will be safe. By using burner Email you will be difficult to track.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
What are 4 key things you learned about the topic from reading their paper? How does...
What are 4 key things you learned about the topic from reading their paper? How does the topic relate to you and your current or past job? Critique the paper in terms of the organization and quality. Team 3 answer questions above. Part I In today’s world we see fear among people when dealing with sexual harassment. This leads to people not reporting sexual harassment. A misconception about sexual harassment is that it’s only about touching and forcing other people...
1. By convention, how are configuration files separated from regular files? (NOTE: A practical effect of...
1. By convention, how are configuration files separated from regular files? (NOTE: A practical effect of the separation is that they are not displayed by the default version of the ls command)                         a. the prefix "rc" (rc.filename)               c. the extension .cfig                         b. a dot (.) at the beginning                    d. by having the SUID bit set 2. The IP address which is reserved for local loopback (equivalent to "localhost") is:                         a. 255.255.255.0                                   c. 192.168.70.1...
1.Establishing the virtual Management: As known, managing virtual staff requires a different method or approach than...
1.Establishing the virtual Management: As known, managing virtual staff requires a different method or approach than managing local staff. Due to that reason, Golden Scent has developed a strategic plan to successfully manage its virtual staff in the USA. Identify the suitable manager. to make sure our work will proceed as we planned, Golden Scent willrecruit a virtual manager with the essential skills and knowledge required to manage virtual employees. Find the skilled people to work with. Since not everyone...
Team 5 answer the questions What are 4 key things you learned about the topic from...
Team 5 answer the questions What are 4 key things you learned about the topic from reading their paper? How does the topic relate to you and your current or past job? Critique the paper in terms of the organization and quality. Incentive Systems             In this paper, we will focus primarily on financial rewards that companies use to attract, retain and motivate the brightest and most talented candidates in the labor market. By providing a reward system that...
Rosa Lee and Scott Bradshaw are facing an important decision. After having discussed different financial scenarios...
Rosa Lee and Scott Bradshaw are facing an important decision. After having discussed different financial scenarios into the wee hours of the morning, the two computer engineers felt it was time to finalize their cash flow projections and move to the next stage – decide which of two possible projects they should undertake. Both had a bachelor degree in engineering and had put in several years as maintenance engineers in a large chip manufacturing company. About six months ago, they...
1-How important do you believe it is to be task-oriented and relationship-orientated? How would you describe...
1-How important do you believe it is to be task-oriented and relationship-orientated? How would you describe Musk? 2-Why do you think Musk is successful in overcoming obstacles and handling conflict? How do you overcome obstacles in influencing individuals in your life? 3-Besides the personality traits given in chapter 2, what other traits attribute to a great leader? Recognizing Your Traits The definition of intelligence is the ability to acquire and apply knowledge and skills. Elon Musk knew little about rockets...
After reading the following article, how would you summarize it? What conclusions can be made about...
After reading the following article, how would you summarize it? What conclusions can be made about Amazon? Case 12: Amazon.com Inc.: Retailing Giant to High-Tech Player? (Internet Companies) Overview Founded by Jeff Bezos, online giant Amazon.com, Inc. (Amazon), was incorporated in the state of Washington in July 1994, and sold its first book in July 1995. In May 1997, Amazon (AMZN) completed its initial public offering and its common stock was listed on the NASDAQ Global Select Market. Amazon quickly...
In this second portion of the Final Exam, you will critically evaluate a quantitative research study...
In this second portion of the Final Exam, you will critically evaluate a quantitative research study on a social science topic. Your instructor will post an announcement with the reference for the article assigned for the exam. The study will be from a peer-reviewed journal and published within the last 10 years. In the body of your critique, describe the statistical approaches used, the variables included, the hypothesis(es) proposed, and the interpretation of the results. In your conclusion, suggest other...
Delta airlines case study Global strategy. Describe the current global strategy and provide evidence about how...
Delta airlines case study Global strategy. Describe the current global strategy and provide evidence about how the firms resources incompetencies support the given pressures regarding costs and local responsiveness. Describe entry modes have they usually used, and whether they are appropriate for the given strategy. Any key issues in their global strategy? casestudy: Atlanta, June 17, 2014. Sea of Delta employees and their families swarmed between food trucks, amusement park booths, and entertainment venues that were scattered throughout what would...
Item 1 In the case below, the original source material is given along with a sample...
Item 1 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version But what are reasonable outcomes of the influence of global processes on education?While the question of how global processes influence all aspects of education (and who controls these forces) is multidimensional and not completely testable, there appear to be some theories of globalization as it...