Register to reply

Identity and Proxy servers

by justwild
Tags: identity, proxy, servers
Share this thread:
justwild
#1
Dec17-12, 09:58 PM
P: 53
Well a common question arises out of my mind that Local IP addresses assigned by ISP are stored...that's ok...But happens when I connect myself to a Proxy server...My identity is protected..isn't it...So even if I do something wrong I won't be prosecuted as because the convict is the proxy server and prosecuting them would be another problem as they belong to different nation....What do you people say???
Phys.Org News Partner Science news on Phys.org
New model helps explain how provisions promote or reduce wildlife disease
Stress can make hard-working mongooses less likely to help in the future
Grammatical habits in written English reveal linguistic features of non-native speakers' languages
phinds
#2
Dec17-12, 10:23 PM
PF Gold
phinds's Avatar
P: 6,080
I say that if you are planning on doing something illegal, this forum is not the place to get advice about it.
-Job-
#3
Dec18-12, 12:12 AM
Sci Advisor
-Job-'s Avatar
P: 1,132
Quote Quote by justwild View Post
Well a common question arises out of my mind that Local IP addresses assigned by ISP are stored...that's ok...But happens when I connect myself to a Proxy server...My identity is protected..isn't it...
There's no such guarantee and depends on the proxy. There are many ways in which your identity can leak and allow the proxied requests to be traced back to you.

justwild
#4
Dec18-12, 12:53 AM
P: 53
Identity and Proxy servers

Quote Quote by phinds View Post
I say that if you are planning on doing something illegal, this forum is not the place to get advice about it.
I am not...I am just thinking how vulnerable the system is...
-Job-
#5
Dec18-12, 02:34 AM
Sci Advisor
-Job-'s Avatar
P: 1,132
Quote Quote by justwild View Post
I am not...I am just thinking how vulnerable the system is...
Anonymity is not a vulnerability of the system, it's a feature that many are actually fighting to protect.

It's also nothing new, for instance The Onion Router forwards requests through member nodes using encrypted communication to not only hide the source address but to reduce or eliminate traceability.

Additionally, hackers often use compromised machines as proxies for further attacks, for the same reason.


Register to reply

Related Discussions
Learning about web servers Computers 3
MMO Servers! Can you rent one or must you buy? Computers 2
Proxy Servers? Computers 5
Is it ever theoretically possible for a proxy to be faster than a non-proxy? Computing & Technology 4
Hiding your ip adress through proxy servers? Computing & Technology 13