Can Proxy Servers Truly Protect Your Identity?

  • Thread starter Thread starter justwild
  • Start date Start date
  • Tags Tags
    Identity
AI Thread Summary
Local IP addresses assigned by ISPs are stored, but when using a proxy server, the situation changes regarding identity protection. While proxies can provide anonymity, there is no absolute guarantee of protection, as various methods can lead to identity leaks and traceability back to the user. Anonymity is considered a feature of the system, with tools like The Onion Router (TOR) enhancing privacy through encrypted communication and multiple forwarding nodes. However, the use of compromised machines as proxies by hackers highlights potential vulnerabilities in the system. Engaging in illegal activities while using proxies raises ethical concerns and legal risks, emphasizing that forums are not appropriate venues for such discussions.
justwild
Messages
52
Reaction score
0
Well a common question arises out of my mind that Local IP addresses assigned by ISP are stored...that's ok...But happens when I connect myself to a Proxy server...My identity is protected..isn't it...So even if I do something wrong I won't be prosecuted as because the convict is the proxy server and prosecuting them would be another problem as they belong to different nation...What do you people say?
 
Computer science news on Phys.org
I say that if you are planning on doing something illegal, this forum is not the place to get advice about it.
 
justwild said:
Well a common question arises out of my mind that Local IP addresses assigned by ISP are stored...that's ok...But happens when I connect myself to a Proxy server...My identity is protected..isn't it...

There's no such guarantee and depends on the proxy. There are many ways in which your identity can leak and allow the proxied requests to be traced back to you.
 
phinds said:
I say that if you are planning on doing something illegal, this forum is not the place to get advice about it.

I am not...I am just thinking how vulnerable the system is...
 
justwild said:
I am not...I am just thinking how vulnerable the system is...

Anonymity is not a vulnerability of the system, it's a feature that many are actually fighting to protect.

It's also nothing new, for instance The Onion Router forwards requests through member nodes using encrypted communication to not only hide the source address but to reduce or eliminate traceability.

Additionally, hackers often use compromised machines as proxies for further attacks, for the same reason.
 
In my discussions elsewhere, I've noticed a lot of disagreement regarding AI. A question that comes up is, "Is AI hype?" Unfortunately, when this question is asked, the one asking, as far as I can tell, may mean one of three things which can lead to lots of confusion. I'll list them out now for clarity. 1. Can AI do everything a human can do and how close are we to that? 2. Are corporations and governments using the promise of AI to gain more power for themselves? 3. Are AI and transhumans...
Thread 'ChatGPT Examples, Good and Bad'
I've been experimenting with ChatGPT. Some results are good, some very very bad. I think examples can help expose the properties of this AI. Maybe you can post some of your favorite examples and tell us what they reveal about the properties of this AI. (I had problems with copy/paste of text and formatting, so I'm posting my examples as screen shots. That is a promising start. :smile: But then I provided values V=1, R1=1, R2=2, R3=3 and asked for the value of I. At first, it said...
Back
Top