Identity and Proxy servers


by justwild
Tags: identity, proxy, servers
justwild
justwild is offline
#1
Dec17-12, 09:58 PM
P: 51
Well a common question arises out of my mind that Local IP addresses assigned by ISP are stored...that's ok...But happens when I connect myself to a Proxy server...My identity is protected..isn't it...So even if I do something wrong I won't be prosecuted as because the convict is the proxy server and prosecuting them would be another problem as they belong to different nation....What do you people say???
Phys.Org News Partner Science news on Phys.org
SensaBubble: It's a bubble, but not as we know it (w/ video)
The hemihelix: Scientists discover a new shape using rubber bands (w/ video)
Microbes provide insights into evolution of human language
phinds
phinds is online now
#2
Dec17-12, 10:23 PM
PF Gold
phinds's Avatar
P: 5,718
I say that if you are planning on doing something illegal, this forum is not the place to get advice about it.
-Job-
-Job- is offline
#3
Dec18-12, 12:12 AM
Sci Advisor
-Job-'s Avatar
P: 1,132
Quote Quote by justwild View Post
Well a common question arises out of my mind that Local IP addresses assigned by ISP are stored...that's ok...But happens when I connect myself to a Proxy server...My identity is protected..isn't it...
There's no such guarantee and depends on the proxy. There are many ways in which your identity can leak and allow the proxied requests to be traced back to you.

justwild
justwild is offline
#4
Dec18-12, 12:53 AM
P: 51

Identity and Proxy servers


Quote Quote by phinds View Post
I say that if you are planning on doing something illegal, this forum is not the place to get advice about it.
I am not...I am just thinking how vulnerable the system is...
-Job-
-Job- is offline
#5
Dec18-12, 02:34 AM
Sci Advisor
-Job-'s Avatar
P: 1,132
Quote Quote by justwild View Post
I am not...I am just thinking how vulnerable the system is...
Anonymity is not a vulnerability of the system, it's a feature that many are actually fighting to protect.

It's also nothing new, for instance The Onion Router forwards requests through member nodes using encrypted communication to not only hide the source address but to reduce or eliminate traceability.

Additionally, hackers often use compromised machines as proxies for further attacks, for the same reason.


Register to reply

Related Discussions
learning about web servers Computers 3
MMO Servers! Can you rent one or must you buy? Computers 2
Proxy Servers? Computers 5
Is it ever theoretically possible for a proxy to be faster than a non-proxy? Computing & Technology 4
Hiding your ip adress through proxy servers? Computing & Technology 13