Firstpost
  • Home
  • Video Shows
    Vantage Firstpost America Firstpost Africa First Sports
  • World
    US News
  • Explainers
  • News
    India Opinion Cricket Tech Entertainment Sports Health Photostories
  • Asia Cup 2025
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
Trending:
  • PM Modi in Manipur
  • Charlie Kirk killer
  • Sushila Karki
  • IND vs PAK
  • India-US ties
  • New human organ
  • Downton Abbey: The Grand Finale Movie Review
fp-logo
Pune techie murder: How tech is manipulated to incite mobs
Whatsapp Facebook Twitter
Whatsapp Facebook Twitter
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
  • Home
  • India
  • Pune techie murder: How tech is manipulated to incite mobs

Pune techie murder: How tech is manipulated to incite mobs

FP Archives • June 9, 2014, 12:35:51 IST
Whatsapp Facebook Twitter

We take a look at the tech behind anonymity, and what tools hackers and other people commonly use to avoid detection

Advertisement
Subscribe Join Us
Add as a preferred source on Google
Prefer
Firstpost
On
Google
Pune techie murder: How tech is manipulated to incite mobs

by Nikhil Subramaniam The lynching of a young Muslim techie in Pune by a rightwing Hindu mob over morphed Facebook images has shaken the country, and exposed yet again, the danger of how social media and the Internet can be used to sow racial discord and mob violence, with those responsible able to get off scot free. A report in the Hindustan Times has revealed that the post in question was uploaded via proxy servers from four countries with the uploaders IP address almost impossible to find. Staying anonymous or hiding your location when connected to the Internet is not the easiest of tasks. Websites, services and trackers are always looking and watching, seeing where you are, and what tools you are using to access the Internet (such as your browser, device etc), but there are tools readily available to avoid detection and stay under the radar. Here we take a look at the tech behind anonymity, and what tools hackers and other people commonly use to avoid detection: [caption id=“attachment_1559415” align=“alignleft” width=“380”]AP AP[/caption] Hide the IP Every PC has a unique IP address provided by your Internet Service Provider, (ISP) which is noted by websites you visit along with a datestamp. The reasons could be for simple logging and unique hit counts for the web page, but it’s also great when trying to pinpoint problems. So if you try to hack in to the backend of a website back-end or place an offensive comment, the website’s administrator can track the origin of the page visit or comment. And with a few phone calls and emails to your ISP, you can be tracked down in a matter of minutes. Complicating things is that an IP address cannot be changed easily. Dynamic IP address changes every time you reconnect your Internet connection, these addresses are still logged in their records. Changing a static IP address is not at all easy as it involves contacting the ISP, and the change can take days to take effect. In any case, you cannot do this without getting the attention of others. So how did those responsible for the inflammatory Facebook post that resulted in the death of the Pune techie do it? They seem to have masked their IP by having another IP as a layer over it. This is known as a virtual IP address and can help you avoid being tracked down. Using proxy websites A web-based proxy service allows users to surf other websites by using the Internet connection at the proxy server’s end. What it actually does is tunnel your connection through another PC somewhere in the world. The browsing or downloading speed totally depends on their (the service’s) Internet connection speeds and the number of people accessing the same service at that time. The speed of your Internet connection does not matter in this case. If you go through a proxy service such as Vtunnel or imsly or anonymise.us onto other websites, the IP address of the proxy server is logged as your IP address. For example, if the proxy service is in Uganda and you are in India and using it to access a website in Australia, the Australian website thinks that you have logged in from Uganda. By hopping proxy servers,many hackers can set whoever is looking for you on a wild goose chase. This also may have been done by the Facebook mischief mongers in the Pune case. The Hindustan report says that the post seems have to be logged in via servers from Saudi Arabia, Romania and two other countries. Browser add-ons or plug-ins These fulfil the same criteria as proxy sites, but work on a browser level. A proxy add-on for Firefox and Chrome can easily be found on their respective stores. You’ll need to feed in a proxy server’s IP addresses along with the port numbers, and switch to the server while browsing. Using a tunneling service By far the most secure way of masking your IP is TOR, a proxy service hosted by a group of people favouring anonymity on the Internet. TOR, short for The Onion Router, is intended to enable online anonymity and its name implies the many layers of security in-built into the system. People only have to download the installer from www.torproject.org and run it. It is designed to direct all your Internet traffic through a worldwide volunteer network of servers to conceal the users location from anyone who is out there conducting an online surveillance. With Tor, you can hop and randomly change routes to help obfuscate your tracks. Even though Tor is is intended to protect Internet freedom, it can also be used to connect to the so-called Dark Net, where websites such as Silk Road are found. Using VPN (Virtual Private Network) services Alternatively, hackers could use a VPN service that sets up a connection that is channeled through your ISP to a private network that has open Internet access. This is especially popular when dodging regional restrictions on surfing. However, the big catch is there are very few free VPN services but you could try a free service such as Hotspot Shield. Another problem with VPN services is that they are ad-supported so you are likely to see a number of pop-ups during your open access session. The biggest challenges for law enforcement and governments are the proliferation of masking tools and the difficulty in tracking down users when they use them. One can’t help but think their use is exacerbated by wide-scale State-backed spying. With governments spreading their surveillance nets wider and wider, the chances of such tools being used to spread hate speech and rumour-mongering or even for regular browsing only go up.

Tags
social media HowThisWorks India Pune mob violence IP addresses Pune Techie Murder Proxy servers TOR Uploaders
End of Article
Written by FP Archives

see more

Latest News
Find us on YouTube
Subscribe
End of Article

Impact Shorts

'New dawn': PM Modi meets Manipur violence victims in first visit since 2023 unrest

'New dawn': PM Modi meets Manipur violence victims in first visit since 2023 unrest

Prime Minister Modi visited Churachandpur, Manipur, meeting displaced people from ethnic clashes. Modi laid foundation stones for 14 development projects worth over ₹7,300 crore in Churachandpur. Opposition criticized Modi's visit as "too little, too late" and questioned its impact on healing wounds.

More Impact Shorts

Top Stories

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Top Shows

Vantage Firstpost America Firstpost Africa First Sports

QUICK LINKS

  • Mumbai Rains
Latest News About Firstpost
Most Searched Categories
  • Web Stories
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Tech/Auto
  • Entertainment
  • IPL 2025
NETWORK18 SITES
  • News18
  • Money Control
  • CNBC TV18
  • Forbes India
  • Advertise with us
  • Sitemap
Firstpost Logo

is on YouTube

Subscribe Now

Copyright @ 2024. Firstpost - All Rights Reserved

About Us Contact Us Privacy Policy Cookie Policy Terms Of Use
Home Video Shorts Live TV