Proton

Anonymity is not the same thing as privacy, and confusing these related but different concepts can weaken your online threat model(nieuw venster)

  • Anonymity – Keeping your identity private, but not your actions. For example, using a pseudonym to post messages to a social media platform.
  • Privacy – Keeping some things to yourself, which can include your actions. For example, messaging friends privately so they know who sent the message, but only they can read it. 

Both concepts are different from security, which can often add to the confusion.

  • Security – The precautions used to keep you safe. What exactly “safe” means can very much depend on your threat model. 

Good security is generally a prerequisite for staying private online, but is often less important for anonymity. In fact, anonymity can often be detrimental to security.

A good example of this is Proton Mail‘s optional authentication logs(nieuw venster) feature. Enabling this prevents you from logging into your account anonymously, but it improves your security by allowing you to detect suspicious logins (for example, a login from another country).

For most people, privacy is a great deal more important than anonymity, although there is a limited set of circumstances where anonymity is a valid concern.

What the law says

The right to privacy(nieuw venster) is a common legal concept enshrined in over 150 constitutions worldwide. It is, for example, incorporated into:

The “right to anonymity”, on the other hand, is not so clearly defined and does not enjoy the same legal protections (if any at all).

Who needs anonymity?

Anonymity has become a particularly charged subject in recent years because the lack of accountability it brings has unleashed a torrent of online abuse, hate speech, trolling, and cyberbullying. It has also become associated with unethical marketing practices, such as spamming and phishing — as well as with terrorism. 

This is not to say there is no legitimate need for anonymity — for example, whistleblowers and political dissidents might be in personal danger if their identities are revealed. What most people really require, however, is privacy — the ability to keep what you say and do on the internet to yourself and those you wish to share with. 

And for most people, the need to be secure against the many threats posed by the internet outweighs any need for anonymity.

Anonymity should also not be viewed as an absolute state. A dissident who needs anonymity from their repressive government does not need the same level of anonymity from the Swiss legal system. 

True anonymity is hard

Every server you connect to on the internet — be it a web server, a mail server, or a VPN server — can see your IP address. This is a number that uniquely identifies your internet connection and can be easily traced back to you. Achieving true anonymity on the internet therefore requires good operational security (OPSEC) on your part to ensure your real IP address is not revealed.

Tools that can hide your IP address and protect anonymity include VPNs and the Tor anonymity network, but there’s no solution that can guarantee 100% anonymity. Tor is sometimes considered to be more anonymous than VPNs due to its decentralized nature, but it comes at the cost of lower performance, ease of use, and stability.

Full anonymity is difficult because you must always use anonymity tools for all aspects of your online life, as even a temporary lack of anonymity is sufficient to expose your identity.

Proton offers privacy by default, with optional anonymity

Proton’s mission is to make online privacy available to all, and we have designed a highly secure suite of tools to accomplish this goal.

With the Proton suite, you can:

  • Send end-to-end encrypted emails that no one else can read.
  • Browse the web without anyone watching.
  • Store your files securely where no one else can access them.
  • Plan your life without sharing your schedule with anyone else.

In other words, you can mind your own business on the internet without someone looking over your shoulder.

All Proton services provide privacy by default. One Proton service, Proton VPN(nieuw venster), also provides anonymity if you use it consistently. Proton VPN does not have an obligation to keep data retention logs of online activity and cannot be forced to log user activity under current Swiss law.

 By always using a VPN or Tor to access Proton services, it is also possible to achieve a high level of anonymity. For users that require anonymity, we offer Tor email access via the Proton Mail onion site(nieuw venster).

Learn more about how to use Proton Mail more anonymously(nieuw venster)

Know your threat model

It is vital to understand the difference between privacy, anonymity, and security when assessing your threat model. All Proton tools were designed from the ground up to be both private and secure because that is what most people on the internet need. They can also be anonymous, but remember that that requires you to take extra steps to ensure your own OPSEC.

Gerelateerde artikelen

The cover image for a Proton Pass blog comparing SAML and OAuth as protocols for business protection
en
SAML and OAuth help your workers access your network securely, but what's the difference? Here's what you need to know.
Proton Lifetime Fundraiser 7th edition
en
Learn how to join our 2024 Lifetime Account Charity Fundraiser, your chance to win our most exclusive plan and fight for a better internet.
The cover image for a Proton Pass blog about zero trust security showing a dial marked 'zero trust' turned all the way to the right
en
Cybersecurity for businesses is harder than ever: find out how zero trust security can prevent data breaches within your business.
How to protect your inbox from an email extractor
en
Learn how an email extractor works, why your email address is valuable, how to protect your inbox, and what to do if your email address is exposed.
How to whitelist an email address and keep important messages in your inbox
en
Find out what email whitelisting is, why it’s useful, how to whitelist email addresses on different platforms, and how Proton Mail can help.
The cover image for Proton blog about cyberthreats businesses will face in 2025, showing a webpage, a mask, and an error message hanging on a fishing hook
en
Thousands of businesses of all sizes were impacted by cybercrime in 2024. Here are the top cybersecurity threats we expect companies to face in 2025—and how Proton Pass can protect your business.