Eighty-six percent of U.S. Internet users have used some method to cover their tracks online, the survey found. Problem is, even as a solid majority of people say we should be able to surf the Web anonymously, not many of us are confident that it's possible. Just 37 percent of U.S. Web users say complete anonymity can ever be achieved, according to Pew.
The good news is that there's a big gap between people's expectations and what most have already tried.
Cache-clearing and cookie-disabling are fairly common behaviors. But for whatever reason -- inconvenience, maybe, or unfamiliarity with the tools -- the share of Americans who have tried protecting their privacy in other ways is pretty low.
So what can be done? Here are a few options that don't involve cracking open a computer science textbook.
•Encrypt your e-mail. This is by far the scariest-sounding technique, but if you have a set of step-by-step instructions, you'll be up and running in no time. The basic idea is that for every e-mail account you own, you can create a set of public and private keys that will turn your plain-text e-mails into unreadable gibberish.
Encrypt your chats. Instead of using Google Talk or AOL Instant Messenger, try switching to a chat application that supports encryption out of the box. A lot of people on Windows prefer Pidgin (the Mac analogue is called Adium). Illustrated instructions for setting up your first encrypted chat can be found at securityinabox.org for Pidgin or at adium.im.
Enable incognito mode on your Web broswer. Most browsers come with a private browsing or incognito mode that won't log your search or browsing history and won't retain cookies that sites use to track your behavior. While it won't encrypt the traffic you send over the networks, it's a good way to hide your activity from others who might use the same computer later.
Use a traffic anonymizing service such as Tor. Tor routes your traffic through the Web in ways that makes it hard for someone else to track. To outsiders, it looks as if your Internet traffic is coming from one of Tor's exit relays, which can be located anywhere in the world (read: not where you are). You can download Tor at www.torproject.org.
Pay for a private VPN. This option is a lot like using Tor in that your Internet traffic is masked, but depending on your provider, it could come with more features. The website TorrentFreak asked a number of VPN providers how they operate their business and published a list of the services that TorrentFreak thought provided satisfactory answers.
Use a password manager. Part of the point of encrypting your Internet traffic is to reduce the likelihood of someone gaining the passwords to your online accounts. So why not beef up the security of those accounts in the first place? As Microsoft's Troy Hunt writes, the strongest password is the one you can't remember. To help you keep track of them all -- and you'll have a lot, if every password is different -- use a password manager like LastPass or 1Password. Browser extensions, integration with Dropbox, mobile versions and strong-password generators are all examples of features that help make these tools less of a burden and more useful.
More Nation & World Headlines
Life on Mars? NASA says planet appears to have flowing water 11:32 a.m. Obama: US willing to work with Russia, Iran on Syria crisis 8:27 a.m. Asians to become largest U.S. immigrant group Iraq turns to Russia in fight against Islamic State Pope Francis wraps up U.S. visit with open-air Mass John Boehner warns of ‘false prophets’ among Republicans Elizabeth Warren: Black Lives Matter is like civil rights movement Marijuana bundle drops from sky, slams into family’s carport
Our new comment system is not supported in IE 7. Please upgrade your browser here.