ProtonBlog(new window)

Privacy Decrypted #4: Understanding anonymity vs. privacy

Share this page

Anonymity is not the same thing as privacy, and confusing these related but different concepts can weaken your online threat model(new window)

  • Anonymity – Keeping your identity private, but not your actions. For example, using a pseudonym to post messages to a social media platform.
  • Privacy – Keeping some things to yourself, which can include your actions. For example, messaging friends privately so they know who sent the message, but only they can read it. 

Both concepts are different from security, which can often add to the confusion.

  • Security – The precautions used to keep you safe. What exactly “safe” means can very much depend on your threat model. 

Good security is generally a prerequisite for staying private online, but is often less important for anonymity. In fact, anonymity can often be detrimental to security.

A good example of this is Proton Mail‘s optional authentication logs(new window) feature. Enabling this prevents you from logging into your account anonymously, but it improves your security by allowing you to detect suspicious logins (for example, a login from another country).

For most people, privacy is a great deal more important than anonymity, although there is a limited set of circumstances where anonymity is a valid concern.

What the law says

The right to privacy(new window) is a common legal concept enshrined in over 150 constitutions worldwide. It is, for example, incorporated into:

The “right to anonymity”, on the other hand, is not so clearly defined and does not enjoy the same legal protections (if any at all).

Who needs anonymity?

Anonymity has become a particularly charged subject in recent years because the lack of accountability it brings has unleashed a torrent of online abuse, hate speech, trolling, and cyberbullying. It has also become associated with unethical marketing practices, such as spamming and phishing — as well as with terrorism. 

This is not to say there is no legitimate need for anonymity — for example, whistleblowers and political dissidents might be in personal danger if their identities are revealed. What most people really require, however, is privacy — the ability to keep what you say and do on the internet to yourself and those you wish to share with. 

And for most people, the need to be secure against the many threats posed by the internet outweighs any need for anonymity.

Anonymity should also not be viewed as an absolute state. A dissident who needs anonymity from their repressive government does not need the same level of anonymity from the Swiss legal system. 

True anonymity is hard

Every server you connect to on the internet — be it a web server, a mail server, or a VPN server — can see your IP address. This is a number that uniquely identifies your internet connection and can be easily traced back to you. Achieving true anonymity on the internet therefore requires good operational security (OPSEC) on your part to ensure your real IP address is not revealed.

Tools that can hide your IP address and protect anonymity include VPNs and the Tor anonymity network, but there’s no solution that can guarantee 100% anonymity. Tor is sometimes considered to be more anonymous than VPNs due to its decentralized nature, but it comes at the cost of lower performance, ease of use, and stability.

Full anonymity is difficult because you must always use anonymity tools for all aspects of your online life, as even a temporary lack of anonymity is sufficient to expose your identity.

Proton offers privacy by default, with optional anonymity

Proton’s mission is to make online privacy available to all, and we have designed a highly secure suite of tools to accomplish this goal.

With the Proton suite, you can:

  • Send end-to-end encrypted emails that no one else can read.
  • Browse the web without anyone watching.
  • Store your files securely where no one else can access them.
  • Plan your life without sharing your schedule with anyone else.

In other words, you can mind your own business on the internet without someone looking over your shoulder.

All Proton services provide privacy by default. One Proton service, Proton VPN(new window), also provides anonymity if you use it consistently. Proton VPN does not have an obligation to keep data retention logs of online activity and cannot be forced to log user activity under current Swiss law.

 By always using a VPN or Tor to access Proton services, it is also possible to achieve a high level of anonymity. For users that require anonymity, we offer Tor email access via the Proton Mail onion site(new window).

Learn more about how to use Proton Mail more anonymously(new window)

Know your threat model

It is vital to understand the difference between privacy, anonymity, and security when assessing your threat model. All Proton tools were designed from the ground up to be both private and secure because that is what most people on the internet need. They can also be anonymous, but remember that that requires you to take extra steps to ensure your own OPSEC.

Protect your privacy with Proton
Create a free account

Share this page

Douglas Crawford(new window)

Starting with ProPrivacy and now Proton, Douglas has worked for many years as a technology writer. During this time, he has established himself as a thought leader specializing in online privacy. He has been quoted by the BBC News, national newspapers such as The Independent, The Telegraph, and The Daily Mail, and by international technology publications such as Ars Technica, CNET, and LinuxInsider. Douglas was invited by the EFF to help host a livestream session in support of net neutrality. At Proton, Douglas continues to explore his passion for privacy and all things VPN.

Related articles

Even though the Snowden leaks came out 10 years ago, the United States never ended its unconstitutional surveillance program. It now has a chance to close the legal loopholes that allow warrantless spying on US citizens. But Congress needs to act bef
Over the past year, hackers have been using new and clever techniques to steal people’s online data. At Proton, we’ve been monitoring these evolving strategies and updating our defenses to stay ahead of the arms race.  Often, the attacks involve new
password fatigue
Most people in the digital age have dozens, if not hundreds, of passwords, and keeping track of them is tiring, to say the least. If you’re suffering from password fatigue, you’ll be happy to know there’s an easy fix. The short answer is that you sh
are password managers safe?
Password managers are a great way to generate secure passwords, keep them in encrypted storage together with your credit card details, and improve your online security across the board. But you might be worried about keeping so much sensitive data in
Most of us probably wouldn’t consent to sharing photos of our family and friends with random strangers on the internet. But that’s exactly what we do when we automatically sync our pictures to the non-private servers of Big Tech companies, which can
Google Drive is the world’s most popular cloud storage service by far, with over 3 billion people using Google Workspace (which includes Google Drive, Google Calendar, Gmail, and more). But this ubiquity has recently caused concern following several