Make your own free website on

The Cyber-Privacy Primer

Anonymity is a shield from the tyranny of the majority… It thus exemplifies the purposes behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation—and their ideas from suppression—at the hand of an intolerant society. Justice Stevens, 1996.

THE CYBER-PRIVACY PRIMER: Surfing the Web Without Surrendering Your Identity

An easy to use 16-page manual on how to protect your identity and your privacy on the Internet.

Table of Contents
Grab a Copy
Comments? Send an e-mail

Since 1986, the Internet Archive, a kind of digital warehouse, has been trolling the Web and hoarding everything it comes across-text, images, sound clips. It has preserved my expired [Web]site, it may well have yours.
Joseph Lasica, The Washington Post.

I consider it an invasion of privacy to have words typed in response to a query chiseled in stone. In light of our litigious society, it could be dangerous to post any message at all.
Marie Coady, freelance writer.

...we perceive the Net as a conversation and not as public record, and it turns out to be public record to a larger extent than people are aware of.
Bruce Schneier, author of The Electronic Privacy Papers.

It is suddenly becoming impossible to escape your past.
David Sobel, general counsel for the Electronic Privacy Information Center.

No one likes to be tailed.
Ernest Hemingway, 1952

When you apply for a job...,there's a fair chance your prospective employer will use a search engine to scout out your online postings....
Joseph Lasica, The Washington Post.

It's important to be able to express certain views without everyone knowing who you are.
J. Helsinguis, designer of the remailer.


In Cyberspace Everyone Can Hear You Scream
The Cookie Monster
Anonymous Web-Surfing
Anonymous E-Mail
Other Anonymous Fixes and Tricks
On-Line Freebies to Hide Behind
Erased from History
Cleaning Up What’s Already There
Advertising Your Web Site-Selectively
Betrayed by Your Computer
SHEL: Shredding, Hiding, Encrypting, Locking
Moves and Countermoves

This is a 114 Kb PDF File.
You will need a copy of
Adobe Reader to read and print the Primer.
The CyberPrivacy Primer

Modified: 04.10.1999
© 1998, 1999
This is a work in progress. Permission is granted to make and distribute complete verbatim electronic copies of this item for non-commercial purposes provided the copyright information and this permission notice are preserved on all copies. All other rights are reserved.
Comments are welcome. If you are interested in publishing this booklet, please contact the author at the above e-mail address.