How to completely disappear online in 4 easy steps

We are constantly bombarded with notifications, and everyone seems to know what we're doing. Are you tired of it all? Then why not disappear completely? Here's how.


Without protection, we quickly become transparent online. Law enforcement agencies, corporations, advertisers and even our peers can see every step we take online.

Fortunately, moving from entirely transparent to perfectly invisible requires just a few straightforward steps. Yes, it will take effort and the occasional sacrifice, but not the skills of a powerful computer wizard.


Step 1: Abandon your mobile phone

The most intrusive tracking we experience is undoubtedly through the constant connection of our mobile devices.

  • Phone operators can locate everything with a SIM to within a few meters
  • When a mobile device logs into the phone network, it identifies itself with the both the serial number of the instrument itself and the SIM card

The data gathered from your phone is routinely made available to governments. Hacking syndicates might also gain access via corrupt employees or forgotten backdoors.

Removing the SIM card may not be enough if you want to disappear completely. Your phone could still connect to a network without your knowledge (for example, in case you need to make an emergency call).

A good replacement for a mobile phone is a tablet without a SIM card holder, such as an iPad. An iPod touch is also an excellent substitute.

Make sure the operating system of your device randomizes its MAC address so you cannot be identified by the Wi-Fi networks you use (as iOS does).

Finding a suitable mobile device is admittedly hard. Many handsets require accounts with Google or Apple, don’t receive regular updates, or don’t run critical software, like Tor.


Step 2: Abandon email and social media

This is hard not because it requires technical skill, but because you’ll leave behind people who won’t follow you into the anonymous darkness that lies behind the glitzy advertisement-filled world of venture-capital-backed social media giants.

Without a phone number, you won’t be able to sign up for many services. Even behind layers of anonymity networks, social media accounts monitor your every click and comment, giving them a lot of power over you.

Living entirely without an email account or a phone number might be impossible. You can consider running your own email server, although doing so in a secure manner is tough.

To preserve your anonymity and keep the use of email, find a paid provider that accepts Bitcoin and tolerates connections via the Tor network, ideally through a .onion address.

You might also be able to find a vendor that offers an anonymous phone number for Bitcoin use. This would be useful for any social media or chat accounts you choose to maintain.

Opt for communication networks that are federated or decentralized and do not require email addresses or phone numbers to sign up. Great examples of such are Jabber (with Off-the-record encryption) and the Bitcoin-inspired Bitmessage network (still in beta).


Step 3: Encrypt everything and route through Tor

Tor is a slow and tedious but a highly efficient anonymity network. It’s not perfect but comes closest to hiding you and your contacts from each other.

As well as using Tor, you’ll have to encrypt all your communications. Don’t exchange unencrypted emails, chats, or store any unencrypted data online.

To browse the web, use the Tor browser, ideally inside of an operating system like TAILS.

Eventually, you will encounter sites that won’t show content unless you sign up or switch back to your regular browser—a clear sign you should avoid this website.


Step 4: Use Bitcoin and cash only

You are not only tracked when you are using your own devices or accounts but also every time you make an electronic purchase.

Paying with a debit card or PayPal will identify and locate you. It’s probably best to shut down your bank account and all cards entirely.

Learn how to use Bitcoin anonymously

Bonus step: Use a VPN

Tor is a widely used software and keeps millions of people safe. However, it’s still eyed with suspicion by many governments and ISPs.

To hide your activity on Tor, while keeping the anonymity features, disguise your home internet traffic by installing VPN software directly on your router.

With a VPN, your ISP won’t see that you’re using Tor or even which Tor nodes you are connecting to. They’ll just see the IP of your VPN server, and a connection that looks like an ordinary encrypted browsing session.


  1. Hi Lexie, GREAT article fellow anarchist! ? Most commenters here still *seem* to be asleep. Interesting. A few questions: if you make a facebook account under a penname, will fb still be able to identify you through there facial recognition software? And regarding bitcoin, how do you pay for things like your groceries, plane tickets, etc. around the world? Anonymous Bitcoin cards (Xapo, Wirex) aren’t possible (anymore?) and btc isn’t yet accepted in most grocery stores in Europe, Asia, etc. yet, so how does one go about that? Would love to hear your views on that.

  2. I LOVED the article, but could you please explain your last sentence? It appears there is a mistake in it. “With a VPN, your ISP won’t see that you’re using Tor or even the Tor nodes. They’ll just see the IP of your VPN server and not your home IP.” It is my understanding that the first part of this sentence is CORRECT! What you’re doing will be hidden through encryption. However, my understanding is that your ISP will see the IP of your VPN server AND your home IP, but as all the traffic will be encrypted, they won’t know where it is going as a final destination, or what it is saying. Your ISP has the hardwired connection to your home, and MUST know the IP address of your home to send packets there. However they DON’T NEED to be able to see the content or final destinations/connections you are wanting to make. If I am mistaken, I look forward to being educated by whoever wrote this article. If I’m not mistaken, I would simply suggest removing the last half of the last sentence.

    • Well spotted, the last sentence is indeed a bit confusing. I’ve removed the last part and clarified a bit, thank you so much for being such an attentive reader!

  3. You may live in a country where only criminals have to hide, but others are not so lucky. All around the world, journalists, social workers, marginalized people and minorities have to hide from their governments in fear of prosecution and death.

    • @ “Alexander Brooks” and ALL LIKE MINDED PEOPLE. UNTIL YOU TRAVEL OTHER PARTS OF THE WORLD AND TRULY EXPERIENCE HOW THE REST OF THE WORK ( ALL NON USA PEOPLE PLACE AND THINGS ) YOU DONT HAVE A SOLID FOUNDATION TO EVEN STAND ON TO STATE THE RHETORIC YOU ARE REPEATING. most of this technology you are bashing and labeling as criminal do you even know who or what entity developed it, along with the very Internet that we all communicate on and love so dear? tor?——->=- originated in the navy the basics of what we call the net today i guess a good metaphor would be…..; “like how intelligent life crawled out of the primordial ooze so did the modern day Internet/web with its: armed services,government, institutions of higher learning( universities) developing a secure way of communication morphed very quickly into the modern day tech wonder web/Internet. WITH OUT THE MUCH NEEDED PRIVACY PROTECTION AND RELATED ENCRYPTION ETC,ETC,ETC, WE COULD BE LIVING IN A MUCH DIFFERENT WORLD. THERE ARE MANY DIFFERENT NOVELS MOVIES AND THEORIES BY THOSE WONDERFUL EGG HEADS, THAT FEW PEOPLE REMEMBER TO THANK. check out those stories or even just look to the way china or north Korea or the old soviet union back during cold war times, LETS NOT FORGET THE OTHER TOTALITARIAN TYPES OF DISASTERS LIKE HITLER AND STALIN AND MUSSOLINI check out those items n history books and take them as warnings as to what governments can do when they survey and do way to much in the form of regulating and unchecked types of things like media judicial prison CAPITAL PUNISHMENT…………………………………………… CAN SOME ONE HELP ME DOWN OFF THIS SOAP BOX…..

  4. When one (or me) moves to the Mountains wit family, all above steps should be made, first thing i l do is trow my phone to toilet and go live clean healthy life without gov dogs watching me or my family (but anyway everything is my wife’s name , so i m totally fine w that (even the great VPN) 🙂

  5. Its a little drastic but the only real way to disappear is follow the steps above followed by DEATH. Followed by cremation.

    • It’s not ridiculous if you want to completely disappear as the title states. That being said, completely disappearing is a drastic step the majority of us don’t want or need to take.


Please enter your name here
Please enter your comment!