Disclosure: TheBestVPN is reader-supported. When you buy a VPN through links on our site, we may earn commissions. Learn more.

How to Hide My IP Address in 2023

Rob Mardisalu

Rob Mardisalu

In this article, Rob talks why people hide their IP address and how you can do the same.

Hiding an IP address is quite simple if you know which tools to use.

If you’re like me, someone who wants to hide my ip in order to get access to geo-blocked sites, negate IP bans and just stay anonymous, keep reading.

Below, I’ve listed 8 fool-proof ways to hide your IP address including keeping your Internet connection encrypted and fully anonymous.

What is an IP Address?

Let’s first get some basics out of the way.

The internet, being nothing more than a vast group of interconnected networks, requires a system to establish communication between these networks. The Internet Protocol, usually referred to as IP, is the principal technology, responsible for this connection. IP is tasked with defining, structuring and delivering information packets from point A to point B.

IP addresses are nothing more than system identifiers. In version four of the internet protocol (IPv4), IP addresses are defined as a 32-bit number; x.x.x.x where x is a value between 0 and 255.

Here are some valid IP addresses:

  • 123.45.67.89
  • 8.8.8.8 – an IP address assigned to Google
  • 140.247.224.81 – an IP address assigned to Harvard University

Every system, connected to the internet, has its own address; much like the address of your house or the license plate of your car. Every system has to have a unique IP address, assigned to that machine, and that machine only. This means your phone, your laptop, work computer and your printer, all have different IP addresses.

Every participant of the internet has to have an IP address to connect to it.

The way IP operates, IP addresses are a sensitive piece of information as they pinpoint the location of the systems they are assigned to. This is uncircumventable, as the physical location of the connected machine is precisely the information necessary for the internet protocol to establish the most efficient connection.

This is how I know that any IP, which starts with 140.247 will be assigned to Harvard University and how I know where you are based in, simply by looking at your IP address.

 

8 Ways to Hide Your IP Address

Check out these six ways to alter your IP address.

1. Get a VPN Software

Probably the best and most convenient way for changing your IP is to choose a good VPN service.

Here’s what VPN does:

  • Hide’s your IP address
  • Encrypts your internet traffic
  • Allows you safely torrent
  • Allows you to get access to geo-blocked sites like Netflix and Hulu.

As you can see, the benefits of a Virtual Private Network are precisely the same as the benefits of changing your IP address.

No surprise here; VPNs assign new IP address to systems connected to them. As you connect to a virtual network, you’ll be assigned a second IP address, which spoofs your real one.

How Do Virtual Private Networks Work

Setting up your VPN client takes minutes, and once you’re all set up, connecting to it and thereby changing your IP happens at the click of your button.

“That’s all great, Andrey, but how does a VPN change my IP address?”

Great question – I’m excited to tell you.

While you’re connected to a VPN, the VPN provider will assign you a virtual IP address. While your real IP address will still be used to connect to said VPN, all other traffic will be tunneled through your private network and as such this external traffic will only connect to your second, virtual IP address.

I’m recommending NordVPN ($3.49/mo) because it’s by far the most anonymous and reliable VPN software we’ve tested to date. It’s secure and it doesn’t like your IP address. You can choose from their 1500+ servers (different IP’s). You can read our NordVPN review here.

Another good VPN service option (at a cheaper cost) is Surfshark ($1.99/mo)  Read our Surfshark review here.

ExpressVPN is also an option, but it comes at a higher price point. ($6.67/mo). Read our ExpressVPN review here.

2. Use a Proxy – Slower than VPN

How Do Proxies Work

Proxy servers are great little tools which act as a bridge in the flow of your internet traffic. These man-in-the-middle servers connect your information packets to their desired destination while changing their appearance as they go through the Proxy.

In simpler terms, the Proxy server intercepts your traffic and takes control of your connection. From here, everything you do, the proxy server repeats; it mirrors your behavior. The destination servers (websites you’d like to access) think of the proxy is your traffic.

The beauty of this system is that you can connect to any proxy server in the world.

Say you want to access UK’s BBC. You’ll quickly find out that most of their content is blocked and inaccessible for people outside the United Kingdom. In comes the Proxy server. You connect to a UK based Proxy and voila – for all intents and purposes, you’re henceforth as British as fish and chips.

Proxy servers are very efficient at low profile necessities such as bypassing geo-blocked content or IP restrictions.

Being able to mask your real IP address is where the similarities between VPNs and Proxies end.

While being more than adept at handling Netflix geo-restricted content, Proxies can’t compete with a VPN’s many layers of security. Outside spoofing your IP address, Proxy servers neither encrypt your data nor remove any identifiable markers from it. Proxies will do nothing to shield you from the prying eyes of your ISP, government or anyone with access to your data.

The final big difference between Proxies and VPNs is the former’s lack of encompassing spoofing. While a VPN will encrypt any and all data coming into and out of your system, a Proxy will intercept traffic on a per-application basis.

Say you connect your web browser to a proxy server. Great! You can watch all the Netflix you want, don’t go torrenting files, however. Your torrenting traffic won’t be intercepted by your Proxy and your ISP can easily see what you’re up to.

Further reading: Difference between VPN and Proxy

3. Use TOR – FREE

TOR, named after the original project “The Onion Router” is a free client which anonymously connects you to volunteer-operated network of servers. This enables you to be assigned a new IP address, on the same basis as a VPN client.

TOR Network Structure

Also known as the “dark/deep” web, Tor has the added benefit of enabling you to access websites, otherwise inaccessible with normal browsers. Such “onion” websites have very different domain names as they are mostly randomly generated.

Check out the domain name of the anonymity search engine DuckDuckGo:

 http://3g2upl4pq6kufc4m.onion

TOR being a widely accessible, free and anonymous network, it has become a hub for criminal activity. Also one of the reasons why you may be put on a “list” if you access TOR, a big chunk of the network’s users connect to it to carry out illegal transactions. From false identities to heavy drugs and even weaponry.

Another big drawback of TOR is the extremely slow loading times. These long loading times are predicated on the inefficient and long-winded routes that your data packets are sent on, relayed from server to server, until they finally hit their destination. This, of course, is all done in the name of safety.

Make no mistake, TOR isn’t entirely foolproof. Certain software vulnerabilities and website admin errors can and are exploited by Government agency.

Further reading: Tor vs. VPN (What is the difference)

4. Multiple Layers of Connection – Slow but secure and anonymous

Using multiple layers of connection for privacy and security involves combining different technologies like VPNs, proxy servers, and the Tor network. This approach adds extra layers of encryption and IP masking, making it more difficult for anyone to track your online activities or determine your real IP address. Let’s delve into how this can work:

VPN Over Tor

How it Works: This setup involves connecting to a VPN service after your traffic has already been routed through the Tor network. Essentially, you first connect to the Tor network, and then the traffic from the Tor exit node goes through a VPN.

Advantages:

    • Enhanced Anonymity: Your ISP can’t see you’re using Tor, as the traffic they see is only between you and the VPN.
    • Website Anonymity: Websites see the VPN’s IP address instead of the Tor exit node’s IP, which can be useful since some websites block Tor exit nodes.
    • Additional Encryption Layer: The VPN encrypts your data even after it leaves the Tor network, adding an extra layer of security.


Disadvantages:

    • Speed Reduction: Both Tor and VPNs reduce internet speed, so using them together can lead to significant slowdowns.
    • VPN Trust Required: You must trust the VPN provider because they can see your traffic after it exits the Tor network.

Tor Over VPN

How it Works: In this configuration, you first connect to a VPN server, and then use the Tor network. Your internet traffic is encrypted by the VPN and then routed through the Tor network.

Advantages:

    • ISP Cannot See Tor Usage: Your ISP and anyone monitoring your local network can’t tell you are using Tor, as they only see encrypted VPN traffic.
    • Access to Tor-Blocked Services: Some services block Tor exit nodes, but with this setup, you can access those services, as the VPN IP is what the service sees.

Disadvantages:

    • Speed Issues: Similar to VPN over Tor, the combined use of both services can significantly slow down your internet connection.
    • Entrusting VPN Provider: The VPN provider won’t know what you’re doing inside the Tor network, but they will know that you are using Tor.

Proxy Chains

How it Works: This involves using multiple proxy servers in a row. Your traffic is routed through several different proxies, making the tracking of your original IP more complicated.

Advantages:

    • Layered IP Masking: Each proxy server masks your IP with its own, adding layers of IP addresses that need to be unraveled to trace back to you.
    • Can Be Combined with VPN/Tor: Proxy chains can be used in conjunction with Tor and/or VPNs for even more layers.

Disadvantages:

    • Complex Setup: Setting up proxy chains can be technically challenging.
    • Variable Security: Proxies don’t necessarily encrypt your traffic, so the level of security depends on the types of proxies used and their configurations.

Overall Considerations

  • Trust and Jurisdiction: Always consider the trustworthiness and jurisdiction of the VPN or proxy providers.
  • Legal Implications: Be aware of the legal implications in your country when using such methods.
  • Purpose and Needs: Tailor your approach based on your specific privacy and security needs.

Using multiple layers of connection can significantly enhance privacy and security, but it’s important to understand the complexities and potential trade-offs, particularly in terms of internet speed and trust in service providers.

5. Use Mobile Network (Mobile Data Tethering) – Slow and not encrypted

A quick way to change your IP address, if you fear yours has been compromised, is to use your cell phone’s data. As it’s a different system, it will have a different IP address.

This, of course, is no substitute to a laptop/PC workstation. It may aid you in rare emergency situations, when your IP is obviously being attacked, but outside of that, relying on Mobile Data is both ineffective and short-sighted.

Mobile data tethering, also known as mobile hotspot, is a method to share your smartphone’s cellular data connection with other devices like laptops, tablets, or other phones. This can be done via Wi-Fi, Bluetooth, or USB. Here’s a detailed overview:

How Mobile Data Tethering Works

  1. Activation: You enable the tethering feature on your smartphone. This turns your phone into a portable Wi-Fi hotspot.
  2. Connection: Other devices can connect to this hotspot just like they would connect to any Wi-Fi network.
  3. Data Usage: The connected devices use your mobile data plan for internet access. This means any data they use will count against your mobile data quota.
  4. IP Address: Each device connected to the mobile hotspot gets a different IP address, which is assigned by your mobile network. This IP address will be different from your home or office network IP address.

Advantages

    • Convenience: It’s a quick and easy way to get internet access, especially when you’re away from a Wi-Fi network.
    • Portability: As long as you have mobile network coverage, you can set up a hotspot anywhere.
    • Security: Using your own mobile data can be more secure than public Wi-Fi, as it’s less susceptible to common Wi-Fi threats.
    • No Need for Additional Equipment: Unlike other methods like a dedicated mobile hotspot device, tethering doesn’t require any extra hardware.

Disadvantages

    • Data Usage and Limits: Mobile data plans often have data caps and can be more expensive than regular broadband. Heavy usage can quickly deplete your data allowance.
    • Battery Drain: Tethering can significantly drain the battery of your smartphone.
    • Speed Limitations: Mobile data speeds can vary greatly depending on your location, network congestion, and signal strength.
    • Device Limitations: Some mobile carriers or plans might restrict tethering or charge extra for it.

Use Cases

  • Emergency Internet Access: When your regular broadband is down, tethering can be a quick alternative.
  • Traveling: Useful for travelers who need internet access on devices like laptops but don’t have access to secure Wi-Fi.
  • Temporary Setup: Ideal for situations where you need a temporary internet connection for a short period, like in a meeting or conference outside the office.

Technical Considerations

      • IP Address: The IP address you get when tethering will be different from your home network’s IP. It’s assigned by your mobile carrier and can change.
      • NAT and Firewall: Your phone acts as a router, which means it will likely use NAT (Network Address Translation) and may have its own firewall settings that could impact connectivity for certain applications.
      • IPv4 vs. IPv6: Depending on your carrier, you might get an IPv4 or IPv6 address, which can have implications for certain applications or services.

In summary, mobile data tethering is a versatile method to access the internet on the go, offering convenience and portability. However, it’s important to be mindful of its limitations, particularly regarding data usage, speed, and battery life.

6. Connect to Public Wi-Fi – Not Secure

As IP addresses don’t travel with you, using your laptop to connect to a coffee shop’s open Wi-Fi network is an easy way to change your IP address. Same as with Mobile Data, this is neither an effective IP change method, nor a sustainable way of surfing anonymously & securely.

Unfortunately, there are many risks when using such open hotspots networks.

7. Call Your Internet Service Provider

The bitter truth is that we have zero influence on what IP address our systems get assigned to. We can only ask or force our Internet Service Providers to change our IPs for us.

There are two types of IP addresses that your ISP will assign to you. Static and Dynamic. A static IP is difficult to change as you’ll have to go through a lengthy process with your ISP. Most internet providers will, fortunately, assign dynamic IPs.

Asking nicely, so Mom thought me, is always step one. Calling up your ISP and simply asking for an IP change will often do the trick, though you may have to face some unexpected and forward questions as to your motivation behind such a request. Telling them you’re teaching son or younger brother the basics of networking, seems to do the trick.

Force an IP change by unplugging your modem

If being nice fails, an easy way to attempt to force an IP change by your ISP, is to unhook your modem and reconnect it after a little while. By severing your connection to your ISP, you’re very likely to be assigned a new IP range. This only works if you operate on dynamic IPs, however. You also have to remain disconnected from the internet for many hours to prompt a change in IP address.

Here are some additional steps you can take on Windows before unhooking your Modem:

How To Release IP Address On WIndowsWindows system connected via cable

  1. Open Command Prompt as Administrator
  2. Type “ipconfig /release“, without the quotes and hit Enter
  3. Type “ipconfig /renew“, without the quotes and hit Enter
  4. Shut down your system.
  5. Turn off all ethernet hubs/switches.
  6. Unplug cable/DSL modem.
  7. Leave off as long as you can bare (overnight)
  8. Turn everything back on.

Windows system connected via router

  1. Log into the router’s admin console.
  2. Release the IP address (Every router is different, Google yours)
  3. Shut down your system.
  4. Turn off all ethernet hubs/switches.
  5. Unplug cable/DSL modem.
  6. Leave off as long as you can bare (overnight)
  7. Turn everything back on.

Are you chuckling yet? I sure am 🙂

I’m not saying the above doesn’t work – it works just fine. I’m saying I’m not about to dial my phone and sit on hold for half an hour or disconnect myself from the internet every time I want to change my IP address.

With ISP’s selling my browsing history to the highest bidder, I sure wouldn’t trust them to help me out either.

Effective? Yes! Practical? Heck No!

Unfortunately for you and me, this about sums up the ways we can change our IP address. Sure, there are others, more technical ones. If you’re an expert in networking you can modify your router and force a dynamic IP change that way – but that’s neither simple, nor quick, nor guaranteed.

Changing IP addresses simply isn’t the way to go, hiding them, however, is another story entirely 🙂

 

Why Hide IP?

How To Hide My IP Address

It is very much in our interest to make sure no wrong-doers ever get their hands on such an important identifier as our IP Address. Let’s take a look at the main reasons why you would want to hide your IP address.

1. Hide Your Location

As mentioned above, your IP address functions much like the street address of your home; it tells the Internet Protocol where to send your requested information packets. This is predicated on the IP’s ability to pinpoint your exact location, enabling it to connect you to your nearest network and from there to the world.

Here is a list of geo-location information that your IP address harbors:

  • Country
  • Region
  • City
  • ZIP code
  • Longitude and latitude

Pretty scary to think that a criminal could have access to your GPS coordinates by simply finding out your IP, isn’t it?

2. Circumvent IP restrictions

Being a very precise location identifier, your IP address is often used to block you from accessing certain information which someone has deemed inaccessible for you.

When governments like those in China, Russia and, Yes, the United States restrict access to certain websites and services by blocking their nation’s IP addresses, “spoofing, the act of masking your IP address, comes in handy.

From journalists to activists and your everyday person, nobody should be oppressed and restricted to share their views in the information era.

Colleges and universities also love to meddle with their student’s internet access. Many schools have banned online video game servers from being accessed. This means no League of Legends, World of Warcraft, CS:GO and so on.

I guess these students are mature enough to rack up $200K in debt for a four-year degree, but giving them access to online games? That’s too much.

Circumventing such IP restrictions is important to make sure you, and only you, get to decide which content you’d like to access.

3. Negate IP Bans

Banning your IP address is an easy way for websites and services to immediately block your access to them. This quickly becomes a problem as you try to connect to your paid-for Netflix account, a service which blocks any and all IPs outside the USA from accessing their US library of moves and TV shows, when you’re sitting in your hotel room overseas.

Spoofing or changing your IP address is a quick and easy way of loopholing your way back into services you’ve been mistakenly or unjustly banned from.

4. Block Targeted Attacks

Hiding your IP address quickly becomes a must-do security step once you’ve been targeted by a cyber-criminal, who is after your personal records.

By changing your vulnerable IP address you can throw off and block this specific type of cyber attack on your system.

5. Remain Anonymous on Internet

Anonymity is to be expected, not asked for. Well, not anymore.

When our Congress passes bills, allowing Internet Service Providers to sell your private web surfing data & browsing history to the highest bidder, retaining anonymity in an ever-shrinking world seems all the more precious and important.

Conclusion

Changing your IP address is one of many security steps as you embark on the journey of securing yourself and your data. While there are more comprehensive ways of protection, such as using a VPN, I commend you on your desire and prudence to seek out ways to shield your IP address from hackers and no-gooders.

I sincerely hope this article has helped you find your preferred method of keeping your IP address safe on the inter-webs. Please share it with your friends and colleagues and let me know about your experiences with IP addresses.

Finish guide
Time to drop the mic, you made it!

Surf Safe,

Robert from TheBestVPN.com team

79 thoughts on “How to Hide My IP Address in 2023

  1. Nowadays we are surrounded by many hackers and networking experts & to protect your data from them one must use vpn.

    1. When you use a VPN, you can choose a country where your IP belongs to. Yes, it’s random, but you’re able to choose the country. Hope this helps.

      1. Can you change that location at will? So if I originally chose the UK, could I then change it to the US with a few clicks?

          1. Wait, what? How?
            Trying to watch Jamie Oliver’s food revolution on ABC and it’s giving me one heck of a headache, won’t let me access the vid due to my god damn network location settings, any chance you can change that?

          2. Is there a way to automate this? (make it bounce around from server to server at a certain time interval)

  2. Hi,

    Very informative article. I have a question here. Is there a way to completely hide IP even a fake one? like it should not show anything not even a fake one.

    Regards,
    Aj

    1. You mean, that people will see your IP as “anonymous” instead of numbers? Unfortunately, that’s not doable. You can only hide/change/fake your IP, but the numeric combination will stay..

        1. Hey Tamara,

          Can you let me know what answer are you replying to? I have a hard time figuring it out. 2nd option is just to send me your question and I’ll hopefully be able to answer that.

    1. I mean, changing you IP only works on your PC unless you had some sort of software or function that would connect to another server than the server that’s provided by your ISP…
      Changing your IP is just changing the server that takes and receive data from the protocol web.
      So I would say no…

  3. Thank you for addressing this in such a complete and understandable way. I’m not very internet literate, but I have had my identity hacked. In the last year, I have had my checking account broken into 4 times, and also somebody sent thousands of dollars via Western Union on my account. I am going to do the VPN you recommended. There is no need to waste a bunch of time doing research on this since you were so clear on things. I’m thankful you were only the 2nd site I pulled up.
    Thank you

  4. In changing your IP Address and creating a VPN. Is there a way to make your IP Address look like its coming from say Las Vegas, Nevada or Phoenix Arizona?

  5. Whatever! Some sites identify that you are using VPN or Proxy and they blocked their contect. How to prevent that?

    1. Hi Aron,

      What kind of VPN service are you using? I’d either recommend going with NordVPN or ExpressVPN and try changing between different servers.

  6. Is it possible to mix methods to provide additional security? For example, running through a VPN to connect to TOR?

  7. Hi, I am currently in Spain using a UK television. I am wanting to use the catch up tv but obviously doesn’t allow me as it knows I am abroad. Is there a way of covering the IP address of the tv as I can’t seem to find any of the software you suggest when searching on the tv apps channel.

  8. How can I change my IP addresses. Am using a smartphone… Is there a site I can login through to hide my IP?

  9. Great article.
    Any suggestion of how to access a VPN when the country you are in has already blocked access to VPN provider websites?

    1. I’d recommend trying a proxy to get access to VPN sites. Actually, there are more than 100 different VPN providers, I’m sure one of them is left unblocked 🙂

      1. What do you mean “not much else” ? Your voice of words says basically -something else. But a they only see a little?

      1. If that’s true, then how can you “negate an IP ban,” as stated above? I’m sorry….just trying to understand this. I’m trying to negate an IP ban from my home network, and if I didn’t use a VPN before, therefore making my IP visible, then what’s the point of the VPN? Thanks!

  10. THANK YOU this is very helpfull & I will go with your recommendation for a VPN giving you some commission. Great work and much appreciated.

  11. Thanks for the great info. Well written for lightweights like me… 🙂

    1. I would like confirmation that many nefarious (and non-nefarious) internet data tracking people collect and cross-reference a user’s different IP addresses (from a laptop to their desktop, and/or their cell phone, etc.) when a user has cookies enabled or when signing into a platform from the different devices. Please confirm.

    2. If #1 above is true, in the event we start using a VPN, should we delete and never allow cookies to be enabled (which would allow cross-reference tracking with VPN engagement to old data, like if we log into a pre-VPN online account)? It would seem to me that as soon as I logged into any website portal using cookies, facial recognition, etc., all user data collected before using the VPN will be connected to at least the current session’s data. Yes?

    1. I would like confirmation that many nefarious (and non-nefarious) internet data tracking people collect and cross-reference a user’s different IP addresses (from a laptop to their desktop, and/or their cell phone, etc.) when a user has cookies enabled or when signing into a platform from the different devices. May you please confirm this for me.

      well if above is true, in the event we start using a VPN, should we delete and never allow cookies to be enabled (which would allow cross-reference tracking with VPN engagement to old data, like if we log into a pre-VPN online account)? It would seem to me that as soon as I logged into any website portal using cookies, facial recognition, etc., all user data collected before using the VPN will be connected to at least the current session’s data. Yes or No?

      Also what dose happen to all the data that has been collected on us is there away to make it not see able as well. i figured the government would still have it but will everyone else in the world still have access to it as well also. Thank you for your time

  12. This article is super informative, thank you 🙂
    I have a question. I currently live in Greece but my university and staff are in Denmark. Therefore, it is important that if I am checked somehow I would like my IP address to be shown as a Danish and not as a Greek one.
    Will a VPN, like an ExpressVPN, provide me with a Danish IP address even if I live in Greece?
    Thank you in advance!

    1. Hey George!

      Yes, that’s what a VPN does. It gives you the destination IP that you want it to. You need to check which VPN providers have Danish servers though. I’m more than sure that Express has got one.

  13. Interesting read, I see you recommend two best known providers, but what about smaller or newer ones? Do you have a review for Surfshark or CactusVPN? Would be interesting to see what you think about those.

  14. If someone were to approach your VPN service, are they be able to identify the real IP that is behind the virtual IP. In other word, does the VPN service itself even truly know which real IP’s are (or were, if changed) using which virtual IP’s?

  15. I’m naturally skeptical about using any centralized official service like a VPN company because I fear, unlike TOR, what is to stop authorities from subpoena the VPN service for source IP addresses … is that possible? Please let me know. Thanks.

  16. Is there a VPN that will allow me to choose a IP of a different US state, not a different country?

    1. Of course! A lot of VPN providers list their server park on their website. If you’re interested in one, head to their website and see if they’ve got a suitable server in that certain state for you.

  17. Interesting article. I’m doing research for a book I’m writing and need a sure fire way for my antagonist to use a social dating site without being able to be traced back to their home. Which method is the most full proof way to remain hidden?

    Thanks

    1. It depends on the VPN provider, your bank, your chosen VPN server location. I’ve gotten different feedback, some say it’s easy with a VPN, some say it’s near impossible. I don’t think it should be too much of a struggle when you use another IP in your own country. Banks protect you if a foreign IP is logging into your bank account, as it should. I personally haven’t had any issues using a VPN.

  18. Being technotarded is really a struggle. I appreciate your efforts to help the lame like me. To my point, I’ve been hacked three separate times. I’m a disabled vet on embarrassing low income, using a “smartphone” (a joke by itself)
    I desperately try to limit putting myself at risk, but feel trapped.
    I would be eternally grateful if someone could be patient with me, and provide personalized help.
    Thanks, God nless

  19. Hi I’m just wondering if a VPN will hide me downloading torrents, so my internet provider doesn’t know what I’m doing?

  20. If I use my mobile data to access a website, will my location be tracked through my phone, even if it masks the IP? Also, if I connect through public wifi, won’t the location of that network be visible? I just need my location to be hidden for one particular site that I have to access while traveling. If I access it on my phone will that do the trick or will it show where I am generally? Thanks!

    1. It depends on the VPN. Generally VPN providers will see your entry point, but all of them have different logging policies on what they are going to keep stored in their database.

  21. Any good VPNs that don’t ask for card or payment tricks, and also hide location? Tried some but when I go “where am I” it shows up. So free with no catch no payment tricks no card… And proper anonymity. P. S. Nothing secure about TOR

    1. Hey Ryan,

      Sadly with VPNs I can’t advise you to go for a free VPN. Free VPNs are almost always backed by ads and trackers. Free VPN companies might sell your data to the highest bidder. I have an article on this topic: “How free VPNs sell your data” – it’s a bit outdated now, but you get the general idea how it works.

  22. What’s the point of changing your IP? (you don’t actually hide it)

    Quite a few of sites with which I interact – Google, Bank, Broker, Hosting etc. Rely on knowing my IP – if I change it, I will have to “prove” that my computers (5) are legal.
    It is pointless to change your email, since it’s on your website, and must be knows to most organizations you deal with. Ehen dealing with suspicious client/supplier I create new email, and delete it a week later.
    I can easily block spam, malware, viruses ans simply junk on hosting level and Antivirus (Nod32)

    Using your techniques, unless you use VPN or change it daily, your IP will become “known” within a week.
    I have 35 years IT experience.

Leave a Reply

Your email address will not be published. Required fields are marked *