We are currently upgrading our print fulfillment systems. Print book orders placed between Sept 22 and Oct 9 will be delayed. Delivery of these orders will start on Oct 10, with purchases being fulfilled in the order received. Buy the Print and get eBook immediately for FREE. Use Code BOGO. Or save up to 40% on all orders with code: DELTA. Exclusions apply. Click here for terms and conditions.
Practical Anonymity

Practical Anonymity, 1st Edition

Hiding in Plain Sight Online

Practical Anonymity, 1st Edition,Peter Loshin,ISBN9780124104044






229 X 152

Print Book + eBook

USD 35.94
USD 59.90

Buy both together and save 40%

Print Book


In Stock

Estimated Delivery Time
USD 29.95

eBook Overview

VST format:

DRM Free included formats: EPub, Mobi, PDF, EPUB, MOBI

USD 29.95
Add to Cart

Key Features

  • Simple, step-by-step instructions for configuring and using anonymous networking software
  • Use of open source, time-proven and peer-reviewed tools for anonymity
  • Plain-language discussion of actual threats, and concrete suggestions for appropriate responses
  • Easy to follow tips for safer computing.


For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. Practical Anonymity: Hiding in Plain Sight Online shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This practical guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible.

For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult because most of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple.

The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers.

Simple, step-by-step instructions for configuring and using anonymous networking software

  • Simple, step-by-step instructions for configuring and using anonymous networking software
  • Use of open source, time-proven and peer-reviewed tools for anonymity
  • Plain-language discussion of actual threats and concrete suggestions for appropriate responses
  • Easy-to-follow tips for safer computing

Peter Loshin

Pete Loshin writes and consults about Internet protocols and open source network technologies. Formerly on staff at BYTE Magazine, Information Security Magazine and other publications, his work appears regularly in leading trade publications and websites including CPU, Computerworld, PC Magazine, EarthWeb, Internet.com, and CNN. Pete Loshin, Independent Consultant

Affiliations and Expertise

Internet-Standard.com, Arlington, MA, USA

Practical Anonymity, 1st Edition

Chapter 1 Getting Started: Threats

1.1: Privacy leakage: how personal information is accessed online

1.2: How to re-secure privacy: strategies for reducing information exposure

1.3: Securing the computer / what are the threats? (keyloggers, malware, etc)

1.4: Securing the data / what are the threats? (network scanner, logs, rootkit, etc)

1.5: Securing the network (scanners, logging, protocol sniffing, unencrypted links, etc)

Chapter 2 Securing the Computer

2.1: Relying on the operating system

2.2: Getting a secure OS (bootable CD/DVD/USB)

2.3: Verifying downloads and using encryption software (get gpg and use it)

2.4: Using a virtual machine

Chapter 3 Securing the Network

3.1: Evaluating the threats to your privacy

3.2: Getting/installing TAILS

3.3: Getting/installing Tor bundle

3.4: Other countermeasures

Chapter 4 Using an Onion-Routed Network

4.1: End to end security and limitations of onion routing

4.2: Guidelines for anonymous networking

4.3: Onion routing vulnerabilities and working around them

4.4: Using Tor on Windows and OS X

4.5: Non-technical strategies for improving anonymity

Chapter 5 Hidden Services

5.1: What is a "hidden service"?

5.2: Risks and benefits of running a hidden service

5.3: How to set up a hidden service

Chapter 6 Anonymous Email and other Resources

6.1: Anonymous email services

6.2: Email encryption and anonymity

6.3: Unexpected communications mediable of Contents:

Quotes and reviews

"Diplomat or investigator, whistleblower or a political refugee fearing for your life; some have cause to use the internet anonymously. Yet privacy is dead - and that’s on the authority of Google, as Peter Loshin reminds us at the beginning of his book Practical Anonymity."--Professional Security, November 2013
"Loshin, a cybersecurity expert, introduces the Tor Project and Tor Browser Bundle, an open-source solution for those with a legitimate reason to maintain anonymity or circumvent censorship on the Internet. He includes diagrams showing how the Tor network works, tips for e-mailing anonymously, and resources."--Reference & Research Book News, October 2013
"…the book is easy to read and reasonably well organized. The coverage of Tor is very complete and far easier to read than the Tor documentation… If you are moderately technical and are looking for a book on the capabilities of Tor, then this is a good book to start with."--Escaped…from a Twisted Mind blog, September 30, 2013
"…[in Practical Anonymity] Loshin does a decent job of presenting the topic, including why Tor is important, and who it could most benefit… the book [Simple Steps to Data Encryption] starts with an overview of how to use GnuPG (Gnu Privacy Guard)."--Slashdot.org, September 30, 2013

Shop with Confidence

Free Shipping around the world
▪ Broad range of products
▪ 30 days return policy