How a VPN can help hide your search history
Authored by a Symantec employee
Most of us use search engines on a daily basis. It’s become automatic. If we don’t know what something is, or hear a word that we can’t define, we go online and type the term into our favorite search engine. And voila, we have our answer in seconds.
Your device may not be secure.
Public Wi-Fi isn’t always safe. Without the right protection, your personal information could become public. Protect yourself with Norton Secure VPN. It encrypts the personal information you send and receive on public Wi-Fi to help keep it private wherever you want to log on.
Help protect your information with Norton Secure VPN.
But did you ever stop to wonder what happens to your searches? Sure, you can clear your cookies and search history from your browser, but chances are that information has already been recorded somewhere. And when you think about it, that information reveals a lot about you.
Maybe you’re thinking of traveling to Hawaii, or are worried about a medical test result — or a topic that’s even more private — so you turn to the Web for information. Unfortunately, Web browsers do track your search history. And they associate that information with your IP (Internet Protocol) address, which essentially identifies you and your location much as a return address does.
If you value your privacy, then that fact may be a cause for concern.
Two ways to hide your search history
Even if you’re using a private browsing mode, your IP information is still being collected. The only methods for hiding your search history and staying anonymous online are to use a virtual private network (VPN), such as Norton Secure VPN, or a special anonymization service, like Tor.
Tor, a shortened form of “The Onion Router,” works by sending your encrypted and re-encrypted data through several random nodes on the Internet, creating a circuitous route. It’s similar to how you might try to throw someone off your trail while playing hide-and-seek in the woods: by taking a hard-to-follow route and erasing your footprints. Because the various nodes only know the IP address from the node before and after, none of the nodes knows the complete pathway the data takes. Plus, each completed pathway is only valid for 10 minutes and then Tor generates new random paths. However, your data is not encrypted at the exit node.
With a VPN, your online activities are anonymized and protected because the VPN masks your IP address and encrypts your data throughout the entire transmission. Instead of sending information directly from your IP address, by using a VPN service the VPN server’s IP address is the one associated with your activity. If your VPN service provider has servers around the world, you could appear to be connecting to the Internet from Berlin when you’re actually in Mumbai.
If privacy and anonymity are important to you, remember that your search history isn’t as private as you might think, but there are options for protecting your information from prying eyes.
Safety for every device.
Security is no longer a one-machine affair. You need a security suite that helps protect all your devices – your Windows PC, Mac, Android smartphone or your iPad.
Try for 30 days before you buy with Norton Security Deluxe – helps protect up to 5 of your devices for one low price.
Disclaimers and references:
Symantec Corporation, the world’s leading cyber security company, allows organizations, governments, and people to secure their most important data wherever it lives. More than 50 million people and families rely on Symantec’s Norton and LifeLock comprehensive digital safety platform to help protect their personal information, devices, home networks, and identities.
Copyright © 2018 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Norton, Norton by Symantec, LifeLock, and the LockMan Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Google Chrome and Android are trademarks of Google, LLC. Mac, iPhone and iPad are trademarks of Apple Inc. Microsoft and the Windows logo are trademarks of Microsoft Corporation in the United States and/or other countries. The Android robot is reproduced and/or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other company names and product names are registered trademarks or trademarks of each company.