Security through obscurity: How to cover your tracks online
From Tor to steganography, these six techniques will help obscure the data and traces you leave online
Read more: Security through obscurity: How to cover your tracks online
Story added 5. November 2012, content source with full text you can find at link above.