|
November 08, 2007
IP numbers wearing proxy socks
While I don't have any need to hide who I am (and thus I don't need the type of software I'm about to describe), I thought that as a public service I should correct some misinformation that's been floating around -- not only in some of these comments but in comments left to an earlier post here. Contrary to what some people might think, IP numbers are not always what they seem. There's lots of software for sale which can be used to disguise IP numbers. To give just one example among the many, here's Hide the IP: Anonymous Web Surfing SoftwareCurious about this, I downloaded and tested the free version (which does not allow the user to the abililty to narrow the search only to servers in the United States). The software is very easy to use; here's a screenshot showing my new "proxy puppet" IP. The most handy feature is that it allows you to scroll through available IP numbers to choose the one you want. And here's the IP address behind a test comment that I left to an earlier post, using the name "Rolf": IP Address: 87.230.78.30Again, I don't have the full version, so I cannot scoll through a list of American proxies to find the IP numbers I might want. But if I wanted to pretend I was in, say, California, I'd just look for the right numbers. There are so many anonymous proxy servers that it wouldn't be possible to list them all, but these lists are typical. And if you really want to to a thorough and untraceable job, there are other forms of software which guarantees that your fake IP numbers will be completely untraceable: ProxyChain supports both HTTP and SOCKS4 protocols which makes it efficient enough to be used for web browsing, e-mail sending, FTP (file transfer protocol), and even chatting. When installed on a server, ProxyChain can act as a stand-alone HTTP or SOCKS4 proxy server. ProxyChain can help you create an entire pool of proxy chains; each chain can contain any number of proxy servers. When you, for example, request a web page your computer connects only to the first proxy in a chain. A tunneling request is then created between servers in each proxy chain; and by turn, between chains in your proxy pool (a collection of proxy chains). Afterwards, your request is carried from one proxy to another and from one chain to the following one until it reaches the last proxy in your pool. The request is then sent to the actual target server you specified through your browser. This process makes it virtually impossible to track your real IP address; simply because a tracker has to search down the logs of all intermediate servers for the request made by your actual IP address in a reverse order; not to mention that some servers do not keep such logs. The complex process of connecting through multiple proxy chains is fully automated and does not require the user�s interference. For this purpose, ProxyChain includes a customizable proxy managing tool called Proxy Analyzer. Proxy Analyzer allows you to select the proxy servers you wish to include in your proxy list(s), and allows for automatic validation of each proxy according to functionality, anonymity, speed, and tunneling. It can then exclude all unqualified proxy servers from your connection list with one mouse click. Proxy Analyzer automatically runs periodical checks on your proxy list(s) and updates it with fresh and functional proxies according to your settings.Not only do I have nothing against this kind of technology, I think it's a great way for people who need to protect their identity to ensure total anonymity. Considering what can happen to Iranian or Chinese dissenters, the anonymity it affords can be life saving. The downside is that whatever protects the privacy and saves the lives of dissenters also protects the privacy of spammers and sock puppets. posted by Eric on 11.08.07 at 01:22 PM
Comments
The Tor network and its various counterparts have been going on for awhile, aboslutely *free*. For Firefox the Tor/Vidalia combo works pretty well as does Tor by itself. Web surfing does slow down, but if you need to be anonymized, you can do so. Large images and streaming media are a PITA with such networks, but remember your need to be anonymous outweighs the need for speed. Personally, I don't need it, but have the stuff installed on the system in case I do. Used very rarely heading to sites of extremely 'iffy' content and backing. The various systems have been offering better access for pay, with which you get better speed... but if you don't want folks to get involved with you and are paranoid, why would you *pay* someone to anonymize your net surfing? Makes zero sense. ajacksonian · November 9, 2007 10:26 AM |
|
June 2008
WORLD-WIDE CALENDAR
Search the Site
E-mail
Classics To Go
Archives
June 2008
May 2008 April 2008 March 2008 February 2008 January 2008 December 2007 November 2007 October 2007 September 2007 August 2007 July 2007 June 2007 May 2007 April 2007 March 2007 February 2007 January 2007 December 2006 November 2006 October 2006 September 2006 August 2006 July 2006 June 2006 May 2006 April 2006 March 2006 February 2006 January 2006 December 2005 November 2005 October 2005 September 2005 August 2005 July 2005 June 2005 May 2005 April 2005 March 2005 February 2005 January 2005 December 2004 November 2004 October 2004 September 2004 August 2004 July 2004 June 2004 May 2004 April 2004 March 2004 February 2004 January 2004 December 2003 November 2003 October 2003 September 2003 August 2003 July 2003 June 2003 May 2003 May 2002 AB 1634 MBAPBSALLAMERICANGOP See more archives here Old (Blogspot) archives
Recent Entries
My ongoing inability to explain the difference between zero intolerance and zero tolerance
And if you like hedonism? Go Your Own Way How green was my car! We See Nothing Feeling empathy for Genghis Khan Please Yourself Better Than Printing Money? "you can't have him!" (unless.....) No free speech for assholes!
Links
Site Credits
|
|
Heh.
I couldn't agree with you more. And I am posting from an IP that leads to my real name. For shame!
Anyhow, proxy servers are old news. I'd just recommend that those that want to use proxy servers configure them themselves. Any software the use, especially Microsoft oriented will be compromised. Learn to type...
There are also other options like Tor. Onion routing was invented by the good folks at US Navel Research. One of the very few good uses of money stolen from us peasants at gun point.
And yeah, assholes can use technology just like good folks can. What's new? Been that way since folks knew what an asshole was.
Thus that it ever was, thus that it shall ever be.
Actually a good rant would be how technology will crash the state not usher in a 1984 police state. But that's another rant for another day.