January 26th, 2002, 02:22 AM
I am new here, have longed to ask questions of the veritable and experienced
computer security experts that I know frequent anti online.
OK,,, I could never understand is how someone
accessing the net through an anon proxy could expect to remain anon since it would
seem trivial for a "Concerned 3rd Party" to request log info from that
server... I mean, what good is an "anon" proxy if the only thing standing between you and
a remote machine is a simple query to the admin of the proxy?
January 26th, 2002, 03:32 AM
This would be how things seem to work....
The basis for the anon proxy would be that the proxy would be configured to keep no logs, thus making retrieving something that doesn't exist impossible. However, that which seems impossible would often be possible if implemented by those with the know how (which would be the U.S. Government, which designed and implemented the tcp/ip protocol, and 'has ways of doing things' we (the public) are not aware of(as was explained to me by an information security manager @ Ft. Knox).
The alternative would be using so-called anon proxies that were located outside the legal jurisdiction of the entitiy you were trying to evade. By this, I mean, if you were evading, say, a certain countries gov., you would want to use an anon proxy that was located somewhere the certain gov. was not welcome (say, an enemy or rogue nation).
If this were done via several randomly linked proxies, and bounced off satellite connections, and all of this encoded and such, well, it would be very difficult to be 'traced'.
However, if you implement a 'handshake' with any machine, there is always the 'remote' possiblity you would be captured.
I don't advise doing things on a computer you wouldn't mind 'the government' knowing about.
There is, however, a 'time and place for all things under the sun', so if one were to implement these techniques whos' concepts I vaguely recognized, one could be reasonably assured of their effectiveness.
---....Loading: 1x 2x 3x