I have a question concerning internet security, anonymity and pay VPN services.

1 Answer

Answer :

At a guess, a VPN might work if the service is based outside the US. I’m trying to understand your problem clearly, though – you say he’s using your social media accounts to track down your location, not the other way around? How is he finding your accounts to begin with? Are you friending specific people whose accounts he’s watching? It might be safer to simply avoid on social media anyone whose activity he can monitor. Keep in touch with those people by other means.

Related questions

Description : How much does anonymity matter to you on Fluther?

Last Answer : I am honestly less concerned with y'all figuring out who I am in real life than I am about people from my real life finding this website and reading everything I've written here. In that sense I ... to remove some of the more personal information I had posted in the past out of fear for my safety.

Description : If you had a choice, would you prefer infamy or anonymity?

Last Answer : Anonymity.

Description : [Fiction question] Where can you rent or secure an always-accessible storage locker or lockable unit large enough for a gym bag?

Last Answer : answer:Does it have to be just large enough for a gym bag or can it be larger? Does the owner of the gym bag have significant financial means? If it can be a larger storage space and the owner is ... sneak in. Once inside, he/she could blend in with the crowd until he/she got to the duffel bag.

Description : Should "sources" be revealed?

Last Answer : Nope. People want to be free to speak without attribution. The responsible journalists always verify such statements with other reliable sources to confirm.

Description : What is your opinion of the hacktivist group "Anonymous”?

Last Answer : Well, I kind of like them. Their goal seems to be rooting out corruption and crime, kind of like Batman. But I’m listening.

Description : Who or what is that 'Anonymous' group?

Last Answer : Imagine young college students (probably mostly male), alternatively wanting to save the world from oppressive evils, and wanting to perform a real funny prank. Now get a bunch of them together to work anonymously.

Description : When a post is modded, why is the name of the poster also removed?

Last Answer : answer:The current system is fine with me. I don't see a benefit to the member who has a post moderated to have their name displayed. The reasons given are good enough to satisfy my curiosity. What ... some don't. The best action we members can take is flag the questionable posts when they come up.

Description : Has the hacker association "Anonymous" been hitting appropriate targets?

Last Answer : If they are attacking drug cartels then it’s fine by me. They should have a taste of modern PITA.

Description : Why do people-power movements like Anonymous use the Guy Fawkes mask as an emblem?

Last Answer : I think it’s just because of the movie “V” and the Guy Fawkes connection may not be logical but the Anonymous connection has overwhelmed any other.

Description : What do you think of Anonymous? [See Details].

Last Answer : They’re alright, I guess. I used to hold them in higher regard, but ever since that kerfuffle with Sony, they just annoy me. However, some of the things they’ve done are kind of funny, so I guess it evens out..?

Description : Do the mods know when a user has two accounts (or more)?

Last Answer : I think there are ways to track the accounts back to the user.

Description : How do I become a part of anonymous?

Last Answer : I would like to add that I am also interested in the answer to this question.

Description : How do you feel about the relative anonymity of the internet?

Last Answer : That’s my favorite part! Nobody knows I’m a loser unless… oh, wait…

Description : Are there any good free VPN services?

Last Answer : Hotspot shield free VPN. We think Hotspot is the best free VPN for many reasons, including the ability to use up to five device on the service at once with a daily data serving of 500 mb..

Description : Every time I turn on my VPN for the last couple of months, I suddenly can't access the internet at all anymore - Why?

Last Answer : Well, we need a little more information to help you with this one. Are you trying to VPN to your home network remotely? Your work VPN from home? You home VPN while at home? When you ... to files and services remotely, and is not always set up properly for browsing the internet wile connected.

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : A ………………. is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : VPN question when sending email - which IP address shows up in the email headers?

Last Answer : It would show the sending email server’s IP, which isn’t likely to be either of the ones mentioned. Let’s say you use gmail just as an example. The headers will show Google’s IP address.

Description : VPN question?

Last Answer : answer:Virtual Private Network. Access through a firewall or other security devices like a router, but it is usually to get through the firewall. Used mostly on corporate networks. Generally your data stream both ... If the number string matches, you are admitted, if you, you are out of luck. SRM

Description : Have any cute ideas for a Facebook surname to protect my daughter's anonymity?

Last Answer : Something connected to her fave sport or hobby? Any interests that could help create a name?

Description : Is anonymity really an advantage?

Last Answer : Anonymity kind of goes away as one increases his presence in the community. For instance, right you are just @clod, but a few thousand lurves down the road and we will know you, from your posts. Or ... ) on your own or you will cease to be relevant. We counter the GIFT issue with strict moderation.

Description : Is anonymity on websites our friend or enemy?

Last Answer : answer:Really depends how it's used and what it's used for. A lot of people use things like Formspring and Honesty Box to spew a bunch of hate that they couldn't do without anonymity. Pretty sad ... so is obvious - embarrassment, not wanting to be associated with certain q's that you have, etc.

Description : What is the relationship between anonymity and emotional intimacy online?

Last Answer : I don't believe that actual intimacy online is possible. There is an element missing, and whatever the poster may feel, I argue with the term intimacy . The anonymity relieves us of ... the lack of face to face interaction and spontaneity removes the accountability factor and thus, true intimacy.

Description : Can a blogger blogging personally maintain anonymity with any degree of assurance?

Last Answer : Create a separate mail account for the blog, possibly using a false name and address if required for registration. On the blog, I would be careful about what names I mention (I would probably create aliases for ... country. I have an anonymous blog, myself, and no one has yet to figure out it's me.

Description : Misinforming the subjects for the research purposes is called as follow? a. Anonymity b. Confidentiality c. Scientific misconduct d. Deception

Last Answer : d. Deception

Description : Which of the following generally cannot be done in qualitative studies conducted in the field? a. Getting informed consent b. Keeping participants from physical harm c. Maintaining consent forms d. Having full anonymity rather than just confidentiality

Last Answer : d. Having full anonymity rather than just confidentiality

Description : What is it called when the participants are not revealed to any one but researcher and staff? a. Confidentiality b. Anonymity c. Ethics d. Discretion

Last Answer : a. Confidentiality

Description : ________ means that the participant's identity, although known to the researcher, is not revealed to anyone outside of the researcher and his or her staff. a. Anonymity b. Confidentiality

Last Answer : b. Confidentiality

Description : Ideally, the research participant's identity is not known to the researcher. This is called: a. Anonymity b. Confidentiality c. Deception d. Desensitizing

Last Answer : a. Anonymity

Description : Research never occurred, but data reported is an example of? a. Anonymity b. Confidentiality c. Scientific misconduct d. Deception

Last Answer : c. Scientific misconduct

Description : Suppose you are hurriedly rushing to your school in the morning. Meanwhile your eyes go across the road, where your student met an accident. What decision will you take under this critical condition ... want to take risk unnecessarily D) You are expressing the accident as an adventurous game

Last Answer : B) You reach the site, look after the student, after giving him first-aid, report to the police station and rush towards hospital

Description : Research is not considered ethical if it (A) tries to prove a particular point. (B) does not ensure privacy and anonymity of the respondent. (C) does not investigate the data scientifically. (D) is not of a very high standard.

Last Answer : (B) does not ensure privacy and anonymity of the respondent.

Description : What legislation exists in ZAMBIA Concerning data protection and security?

Last Answer : Law. Zambia regulates data privacy and protection issues under the Electronic Communications and Transactions Act (ECTA). Zambia regulates data privacy and protection issues under the Electronic Communications and Transactions Act (ECTA).

Description : Who is directly responsible to Parliament for all matters concerning the Defence Services of India

Last Answer : Defence Minister

Description : Which of the following statements concerning consulting services is incorrect? a. The performance of consulting services for audit clients does not, in and of itself, impair the auditor's ... including those who provide audit and tax services, also provide consulting services to their clients

Last Answer : Consulting services ordinarily involve external reporting

Description : How to solve VPN problem under Windows 10?

Last Answer : Go to Microsoft > > > https://answers.microsoft.com/en-us/windows/forum/all/vpn-use-sets-off-repeated-microsoft-account/8150f7b2-0631-4fa6-affc-87818b1962ff

Description : Is VPN helpful for learning Programming languages ?

Last Answer : I'm not aware of any nation-blocking for free programming sites, let alone that being a widespread thing. It seems to me that usually when someone posts information for free online, they rarely then ... of thinking. But if you find some, I imagine you can likely spoof your location easily enough.

Description : What VPN provider do you use ?

Last Answer : 5 dollar a month VPS with Leaseweb. Used this tutorial.

Description : IPhone to OS X VPN "Bridging"?

Last Answer : answer:I have worked with several VPNs and VNCs, cross-network, but only on Windows based machines. But I’m surprised you are having issues in the first place. OS-X is basically a juiced up version of Unix and should be pretty network friendly.

Description : IPhone LAN Gaming Over Windows VPN? (UDP Broadcasting)

Last Answer : Try not using a VPN, and try on a regular network, one that your phone makes or one that windows is rebroadcasting (there is software to do that)

Description : Which VPN should I use to watch Hbo go outside the US?

Last Answer : I am more than happy with Private Internet Access. It’s not the cheapest, but it’s got multiple different servers to connect to, and is pretty darn reliable.

Description : Need some VPN advice - which is the best for the money?

Last Answer : VPNs don’t work this way. VPSn only allow you to access a secure network over a public connection, like airport wifi, it will in no way hide you from your provider.

Description : Is this a reliable VPN service?

Last Answer : Guh, sorry. I didn’t read into it enough. The only information collected is via cookies and how you use their website.

Description : How do I set up a VPN network and connect it to my iPod Touch 1st gen?

Last Answer : please answer!

Description : How can I set up VPN under OSX and have network access at the same time?

Last Answer : That's how VPN works. Basically the driver operates at the hardware level, so you can't "switch" between the two networks.

Description : What is the best anonymous VPN?

Last Answer : This isn’t an answer to your question, but what is anonymous VPN?

Description : iPhone VPN functions?

Last Answer : Not sure but I would imagine that it allows you access to your companies intranet via safari as though you were logged on in the office.

Description : Commercial VPN implementation for small business?

Last Answer : My parent company uses Softnet but I can’t tell you much about it otherwise.

Description : How do i set up VPN on Windows XP to work with iPhone?

Last Answer : answer:In order to answer this, I need to know exactly what VPN is, and if you still have this problem, as your original Q was posted around 6 months ago. August 24, 2008, 8:55 AM EDT

Description : This is a werd one: I just installed a VPN from my school, now I can accss American Sites that don't have licencing rights out side the States?

Last Answer : Shouldn’t Time Warner network have a fit over this?