How to Fake your IP Address
One of the biggest problems you’ll run into is that the activity of trying to hide yourself will draw more attention than anything else. Keep in mind there is a whole host of reasons why one would do this, some of them more anti-social than others. If you are committing cybercrime, then you are already probably familiar with the ins-and-outs.
If you have less selfish motives, like trying to get the truth out of oppressive information atmospheres than you’re in luck. A whole new community of patriots from all over the world is finding their way online. Globalism is a force that not only can’t be stopped it can’t even be slowed down.
The accessibility of data that the internet provides has reached a critical mass that can topple governments in a few well placed tweets or a voice over internet protocol call. The internet is a truly liberating force and those who rightfully need to fear their governments need to know what to do to preserve their liberty.
Optimally the best thing you can do is use a public IP. Have everything you need prepared ahead of time in a zip file and get it public as soon as you can. If there are libraries that are monitored then you will need to weigh the plusses and minuses of compromising this network. If you aren’t bold enough to take it to a place you as a citizen are welcome, then the very least you need to do is alter the sending and receiving internet protocol address of your access point.
Cloud services are both your best friend and your second to worst enemy in this situation. Software as a service is easily the best tool in this case. Third party middle men internet protocol or “proxies” are the quickest and easiest.
You just need to hope that it is enough. If that proxy is not hosted in your country, than make sure that the nation you are currently in either has no vendetta against where the IP claims it’s from, or has no intelligence service that can do anything about it.
Alternately , if you have a good bit you need to do on a continuous basis then you should probably pick more than one proxy service and go through the grueling task of putting them in a chain. Just make sure that the first and last stops work with the first rule.
Additionally if you’re in it for the long haul good a virtual private network might be more of what you are looking for. Try to keep your uploading and downloading within the average use of someone in your neighborhood and demographic.
If you send too much data or receive too much data then those who you don’t want to find you will find you or at the very least draw attention to an IP. A virtual private network will keep you safer but playing the game smart is the safest way to fight again tomorrow.