Which of the following is not an example of approaches for maintaining anonymity? 1) Using encrypted search engines that don’t share your search data 2) Use firewalls 3) Fake email services 4) Use file shielders
Answer: Use firewalls Explanation: Using encrypted search engines that don’t share your search data, fake email services, file shielders are examples of approaches usually taken by online users for maintaining anonymity.