What is anonymous browsing?
Anonymous browsing is using the web without exposing information that can be linked back to you. Surfing anonymously means reducing identifiers — such as your IP address, account logins, cookies, and unique device traits — so websites, your internet service provider (ISP), data brokers, and other observers find it harder to tie your activity back to you.
Private vs. anonymous browsing: What’s the difference?
Privacy protects what you do. It limits who can see your activity and the data you share. Anonymity, on the other hand, protects who you are. It makes your actions hard to link to your identity.
These concepts overlap but aren’t the same:
- You can have privacy without anonymity (for example, online banking over HTTPS — your bank knows it’s you, but outsiders can’t see the content).
- You can have anonymity without strong privacy (for example, posting under a pseudonym — your identity is hidden, but the content you post is public).
Working toward one often improves the other, but they do not guarantee one another. Aim to combine both — protect content (privacy) and reduce linkability to your identity (anonymity).
To keep this guide readable, we’ll sometimes use “private” and “anonymous” interchangeably. Every tip in this article improves both privacy and anonymity, just to different extents.
Is completely anonymous browsing possible?
Completely anonymous browsing is impossible. The moment you connect to the internet, you leave a data trail. Tools can hide or blur parts of that data, but they can’t erase every trace. Treat anonymity as a spectrum — you can improve it step by step, but you’ll never reach 100%.
How to browse the web more anonymously
A layered approach works best to surf the web with more anonymity. While complete anonymity is impossible, you can cut most trackers and many ads by combining network protections, strong browser controls, and consistent habits.
1. Use a VPN (virtual private network)
A VPN is one of the best tools to improve anonymity on the internet. It encrypts internet traffic between your device and the VPN server and swaps your IP address for the server’s IP address.
This encryption and IP address masking make it harder for internet providers and local network admins to log the domains you visit and prevent websites and apps from seeing your home or mobile IP address.
However, you should set realistic expectations:
- A VPN doesn’t make you anonymous to the VPN provider. Therefore, you should choose a VPN service with clear jurisdiction and logging policies, independent audits, strong protocols (WireGuard or OpenVPN), a kill switch, and DNS/IPv6/WebRTC leak protection.
- A VPN also doesn’t neutralize tracking tied to your accounts, cookies, or browser fingerprinting, so combine it with strict browser settings and good cyber hygiene.
2. Consider proxy servers
You can also use proxy servers instead of a VPN. A proxy server sits between you and a destination site and can mask your IP address for that session. It can handle simple tasks such as checking regional pricing or accessing a school or office resource that only validates an IP address, but it’s not a full privacy solution.
A few things to keep in mind:
- The proxy operator can still see your requests.
- Many sites detect and block known proxy ranges.
- Unlike a VPN, most proxies don’t provide end‑to‑end encryption, so observers can still inspect data in transit. Don’t use a basic proxy for logging in to financial accounts or transmitting sensitive data.
- A proxy also usually handles only the traffic from the app or browser you set it in. Other apps and background services will keep using your normal network connection unless you also configure them to use the proxy.
3. Try the Tor browser
Tor (short for “The Onion Router”) is a privacy network and browser that routes your traffic through several volunteer-run relays before it reaches a website. Each relay sees only the next hop, which makes it harder to link your IP address to your destination. The Tor browser also makes many settings the same to reduce fingerprinting, so your device looks more like others on the network.
This design improves anonymity compared to regular browsers, but it comes with trade-offs. Multi-hop routing adds latency, so Tor is slower than traditional browsers. Some websites also challenge or block traffic from Tor exit nodes, which can lead to CAPTCHA or access issues.
You can also pair Tor with a VPN (Onion Over VPN) to hide Tor usage from your ISP and local network. However, this combo doesn’t make you untraceable and adds more overhead that can slow you down.
Common misconception about Tor: Tor is often associated solely with the dark web, which leads some people to avoid it. In reality, you can use the Tor browser to access regular websites — news sites, video platforms, forums — while benefiting from stronger anonymity. The dark web is just a small subset reachable via Tor’s .onion addresses, not its primary purpose.
4. Consider another privacy-focused browser
Tor isn’t the only privacy-focused browser. More browsers come with stricter privacy features turned on: They block third‑party cookies and ads by default, restrict cross‑site tracking, and include anti‑fingerprinting protections.
Secure browsers such as Brave or Vivaldi offer these controls out of the box. No browser is 100% private, but starting with one that blocks more trackers and invasive scripts by default reduces the data you share before you add extensions or change settings.
5. Switch to privacy-focused search engines
Google is the undisputed king of search engines, but it’s also one of the world’s biggest data collectors. To limit the amount of data search engines collect on you, consider using a private search engine such as Startpage or DuckDuckGo.
The main benefits are straightforward: These services don’t log your search history and reduce personalization that relies on profiling. Some private engines also minimize ads or block trackers, which makes searches cleaner and reduces data collection.
6. Install browser extensions
Privacy-focused browser extensions can strengthen internet anonymity by blocking data collection at the page level. Used well, they can shrink your digital footprint. Start with a few targeted tools that stop trackers, then add controls that limit what your browser reveals.
The goal is to reduce tracking signals without creating new risks. Focus on browser extensions within these categories:
- Ad and tracker blockers. Block ads, pixels, and common tracking scripts to reduce profiling and speed up pages. Pair an ad blocker with a tracker blocker to cover third‑party cookies and embedded web beacons. Blockers are not perfect, so keep other protections in place.
- Anti‑fingerprinting tools. Some extensions improve your online privacy by masking, randomizing, or blocking unique browser data (canvas, WebGL, fonts) used for tracking.
- Script blockers. Scripts power site features but can also exploit weaknesses, harvest data, or force downloads. Restrict JavaScript on untrusted sites and allow it only where needed. Many extensions let you block JavaScript by default and allow‑list trusted domains. You can also manually disable JavaScript in browser settings.
- Link cleaners. Strip tracking parameters (for example, “utm_,” “gclid,” “fbclid”) from URLs so you don’t pass identifiers when you click, bookmark, or share links.
Important
- Only install extensions from reputable developers and official stores.
- Read privacy policies to see what data is collected and why — some extensions monetize user data.
- Review requested permissions before installing and keep extensions updated.
- Remove extensions you no longer need.
Keep in mind that heavy customization can backfire. If your browser configuration stands out, websites can identify and track you even if you clear your cookies or use a VPN.
This unique setup acts as a digital fingerprint that distinguishes you from other users. Start with your browser’s built-in protections, then add a light touch if needed.
7. Use encrypted email and messaging apps
Email and messaging apps with end-to-end encryption protect message content so only you and the intended recipient can read it. This protection doesn’t hide that communication occurred or who talked to whom.
For email, choose providers that support robust encryption workflows. Email encryption converts electronic mail into ciphertext and decrypts it for the intended recipient. Look for leading encrypted email services that support end-to-end encryption, encrypted address books, and encrypted mail storage, as well as offer transparent security practices.
For messaging, use privacy-oriented messaging apps with end-to-end encryption turned on by default. Lock the app and your device with strong authentication. Don’t back up encrypted chats to cloud services that store them unencrypted.
8. Keep your software updated
Updates patch known flaws that attackers can exploit. Turn on automatic updates for your operating system, browsers, extensions, and security tools.
Automatic updates simplify the process and keep your apps and operating system protected against the latest known threats. Out-of-date software undermines all other privacy steps.
9. Apply additional online privacy tips
Small, consistent habits reinforce your technical setup. Follow these extra online safety tips to further strengthen your privacy online:
- Separate identities and profiles. Keep different browser profiles and email addresses for personal use, work, and general browsing so tracking signals don’t merge. Don’t sign in to personal or work accounts from profiles you use for general research or shopping.
- Manage cookies and site data. Block third‑party cookies to reduce cross‑site tracking. Clear cookies and cache on a schedule for sensitive profiles. Expect to reauthenticate more often as a trade-off.
- Use strong, unique passwords. Store them in a password manager and enable two‑factor authentication (choose app‑based or hardware keys over SMS). This combination reduces account takeovers that can expose links between your accounts and your identity.
- Limit social media exposure. Set your profiles to private where possible and avoid posting identifiable details, live locations, or routines. Assume anything you share can be copied, archived, and searched later. For more tips, check out our blog post on social media privacy.
- Be cautious on public Wi‑Fi networks. Verify the network name with staff, turn off auto join, and use a VPN before logging in or transmitting sensitive data. Opt for cellular hotspots for high‑risk tasks.
- Tighten device settings. Turn off your device’s advertising ID (the resettable ad identifier used to track you across apps and sites). Limit diagnostics and personalized services. Review and revoke unnecessary app permissions for location, contacts, photos, microphone, camera, notifications, Bluetooth, and sensors.
- Consider data removal services. Opt out of people search sites to reduce how much of your personal info is available for profiling. Revisit opt‑outs periodically because records tend to reappear. Alternatively, consider a personal data removal service that reaches out to data brokers on your behalf, requesting the removal of your data from their records.
- Handle downloads carefully. Open risky files in a sandbox or built‑in viewers. Strip metadata from documents and images before sharing. Avoid uploading sensitive files to unknown online converters.
- Check for WebRTC, DNS, and IPv6 leaks. Turn on your VPN’s leak protection features. After you change your VPN, browser, or router, run leak tests again to confirm that your real IP address and DNS requests aren’t escaping the VPN tunnel.
How you can be tracked online
You can be tracked online in several ways. Understanding how you’re being tracked can help you pick the right countermeasures.
IP address tracking
Your IP address reveals your approximate location and network, and it persists across requests. ISPs and network administrators can log the domains you access, while websites can link multiple sessions and requests to the same IP address, building a profile of your private browsing patterns — sites you visit, how often and when you visit them, interests inferred from the pages you view, and the devices or apps you typically use.
Cookies and third-party tracking
Cookies are small text files that websites store on your device to remember information about your visit (for example, login details). Cookies can improve your experience by keeping you logged in and personalizing content. Advertisers also use third‑party cookies and embedded scripts to track you across sites, build profiles, and power targeted ads.
Device fingerprinting
Your browser and device expose technical details such as screen resolution, installed fonts, time zone, operating system, browser version, installed plug-ins, and other settings. Together, these signals create a unique device fingerprint that can identify you even without cookies.
Account tracking
Account tracking links your online actions to a specific profile when you sign in to a website or app. Once logged in, the platform can associate your searches, clicks, purchases, and device details with that account. Single sign-on (for example, using one account to log in across many sites) and cross-service integrations extend this link across multiple websites and devices, which makes profiling easier and more persistent.
Online security starts with a click.
Stay safe with the world’s leading VPN
FAQ
Disclaimer: The trademarks referenced are for illustrative purposes only. NordVPN is not affiliated with, sponsored by, or endorsed by the owners of those trademarks.