The Cloud Browser

Discussions around personal privacy are becoming louder and more complicated, while many countries are trying to get a grip on social networks and on the challenges presented by encrypted Web traffic.

Many tools being developed and marketed promise this privacy through anonymity. Anonymity is not always sought in order to hide malicious activities. In many countries around the world, anonymity can be a matter of life and death — such as when it conceals the identity of someone who is critical of a suppressive government.

Available Tools

There are many tools available to gain anonymity, each with its own benefits and some drawbacks. A private (or personal) VPN, for instance, is an example of an accessible and easy-to-use tool. This is quite often a paid subscription model, however, and many countries and organizations block the infrastructure to these services. Not only will this limit or even prevent the use of these tools, the attempted use can be logged and investigated as a suspicious activity. (Why does this user need anonymity?)

Another option is the use of the Dark Net. However, this can be a complex environment to navigate, full of malicious content. It is far from quick and easy to use for the average user.

But the forward march of technology continues, and new solutions are being developed all the time. An interesting recent development may have the answer to some of these privacy problems. This is the cloud browser.

The Cloud Browser

The vast scale and the unprecedented availability of most cloud platforms allowed companies and individuals to completely rely on outsourced online applications. One of these is the cloud browser, sometimes also called the remote browser.

A cloud browser, located within a cloud platform’s datacenter, effectively operates like a proxy between a user and a target Web (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Frank Siemons. Read the original post at: