Identity and Proxy servers


by justwild
Tags: identity, proxy, servers
justwild
justwild is offline
#1
Dec17-12, 09:58 PM
P: 51
Well a common question arises out of my mind that Local IP addresses assigned by ISP are stored...that's ok...But happens when I connect myself to a Proxy server...My identity is protected..isn't it...So even if I do something wrong I won't be prosecuted as because the convict is the proxy server and prosecuting them would be another problem as they belong to different nation....What do you people say???
Phys.Org News Partner Science news on Phys.org
Simplicity is key to co-operative robots
Chemical vapor deposition used to grow atomic layer materials on top of each other
Earliest ancestor of land herbivores discovered
phinds
phinds is offline
#2
Dec17-12, 10:23 PM
PF Gold
phinds's Avatar
P: 5,676
I say that if you are planning on doing something illegal, this forum is not the place to get advice about it.
-Job-
-Job- is offline
#3
Dec18-12, 12:12 AM
Sci Advisor
-Job-'s Avatar
P: 1,132
Quote Quote by justwild View Post
Well a common question arises out of my mind that Local IP addresses assigned by ISP are stored...that's ok...But happens when I connect myself to a Proxy server...My identity is protected..isn't it...
There's no such guarantee and depends on the proxy. There are many ways in which your identity can leak and allow the proxied requests to be traced back to you.

justwild
justwild is offline
#4
Dec18-12, 12:53 AM
P: 51

Identity and Proxy servers


Quote Quote by phinds View Post
I say that if you are planning on doing something illegal, this forum is not the place to get advice about it.
I am not...I am just thinking how vulnerable the system is...
-Job-
-Job- is offline
#5
Dec18-12, 02:34 AM
Sci Advisor
-Job-'s Avatar
P: 1,132
Quote Quote by justwild View Post
I am not...I am just thinking how vulnerable the system is...
Anonymity is not a vulnerability of the system, it's a feature that many are actually fighting to protect.

It's also nothing new, for instance The Onion Router forwards requests through member nodes using encrypted communication to not only hide the source address but to reduce or eliminate traceability.

Additionally, hackers often use compromised machines as proxies for further attacks, for the same reason.


Register to reply

Related Discussions
learning about web servers Computers 3
MMO Servers! Can you rent one or must you buy? Computers 2
Proxy Servers? Computers 5
Is it ever theoretically possible for a proxy to be faster than a non-proxy? Computing & Technology 4
Hiding your ip adress through proxy servers? Computing & Technology 13