Summary

In this chapter we showed you wide arrays of techniques for making your online communications more secure. We also showed you how you can harden your computer and use different anonymity cryptographic tools to anonymize and conceal your identity online.
What we conclude after this long chapter is that using such security tools will increase your privacy online to a large extent. It will also make spying on you or discovering your identity more time-consuming and require lots of resources, but after all you can’t consider yourself anonymous when you are online. Even with privacy tools such as TOR and VPN, these tools can protect you from the mass surveillance programs deployed by superpower intelligence services. They can also fully protect ...

Get Data Hiding Techniques in Windows OS now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.