Anonymizer

An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information by hiding the client computer's identifying information.[1][2]

Purposes

There are many reasons for using anonymizers. Anonymizers help minimize risk. They can be used to prevent identity theft, or to protect search histories from public disclosure.

Some countries apply heavy censorship on the internet.[3][4][5][6][7] Anonymizers can help in allowing free access to all of the internet content, but cannot help against persecution for accessing the anonymizer website itself. Furthermore, as information itself about anonymizer websites are banned in these countries; users are wary that they may be falling into a government-set trap.[8]

Anonymizers are also used by people who wish to receive objective information with the growing target marketing on the internet and targeted information. For example, large news outlets such as CNN target the viewers according to region and give different information to different populations. Websites such as YouTube obtain information about the last videos viewed on a computer, and propose "recommended" videos accordingly, and most of the online targeted marketing is done by showing advertisements according to that region. Anonymizers are used for avoiding this kind of targeting and getting a more objective view of information.[9][10]

Use of anonymizers

Protocol specific anonymizers

Sometimes anonymizers are implemented to work only with one particular protocol. The advantage is that no extra software is needed. The operation occurs in this manner: A connection is made by the user to the anonymizer. Commands to the anonymizer are included inside a typical message. The anonymizer then makes a connection to the resource specified by the inbound command and relays the message with the command stripped out.

An example of a protocol-specific anonymizer is an anonymous remailer for e-mail. Also of note are web proxies, and bouncers for FTP and IRC.

Protocol independent anonymizers

Protocol independence can be achieved by creating a tunnel to an anonymizer. The technology to do so varies. Protocols used by anonymizer services may include SOCKS, PPTP, or OpenVPN.

In this case either the desired application must support the tunneling protocol, or a piece of software must be installed to force all connections through the tunnel. Web browsers, FTP and IRC clients often support SOCKS for example, unlike telnet.

Use of multiple relays

Proxies can be daisy chained. Chaining anonymous proxies can make traffic analysis far more complex and costly by requiring the eavesdropper to be able to monitor different parts of the Internet.[1] An anonymizing remailer can use this concept by relaying a message to another remailer, and eventually to its destination.

Even stronger anonymity can be gained by using Tor. Tor is not merely a proxy chain, but an onion router, which means that routing information (as well as message content) is encrypted in such a way as to prevent linking the origin and destination. Like all anonymity networks, Tor cannot end-to-end encrypt messages destined for the public internet;[11] that must be arranged between the sender and recipient. Tor's hidden service protocol does, however, provide end-to-end encryption, along with the ability to anonymize servers to make them more censorship-resistant.

Another anonymity network is the Invisible Internet Project (I2P). Unlike Tor, I2P is a fully internal network. The philosophy behind I2P is that each node routes traffic for others and blends its own traffic in, whereas one's own traffic will be relayed by other peers through so-called tunnels made up of various other peers. As you never know if a given mix logs all connections or not, the only way to be really sure there is no logging is to run your own anonymizing mix node and blend your traffic with those of other users, who in turn need not trust you, as they blend their traffic with yours and other users' traffic in their own mix nodes. The network is highly dynamic and totally decentralized. It also takes care of other nodes learning about your node existing, for without peers using your node, there would be no traffic to blend yours with. As all traffic always stay within the I2P network, a routing user's I2P can remain end-to-end encrypted and will never show on public websites' logs.

Examples

Examples of anonymizer websites include Anonymouse, Anonymiz.com, proxy.id, Anonymize, Anonymizer, IDZap, Ultimate Anonymity, The Cloak and GhostSurf Platinium.[12]

See also

References

  1. 1 2 "How Anonymizers Work". The Living Internet. Retrieved 2007-08-03.
  2. RFC 4949
  3. (Reference from Censorship in Singapore#Internet) Mixing welfare and elitism in Singapore", Alex Au, Asia Times, November 23, 2006.
  4. (Reference from Censorship in Saudi Arabia#Internet) http://www.tgdaily.com/business-and-law-features/53403-saudi-arabia-bans-blogging-without-a-licence
  5. (Reference from Censorship in North Korea - where internet access itself is illegal) "List of the 13 Internet enemies". Reporters Without Borders. Archived from the original on 2 January 2008. Retrieved January 9, 2008.
  6. (Reference from Internet censorship in Iran) OpenNet Initiative. (2006.) "Internet Filtering in Iran in 2004-2005: A Country Study". In these countries most anonymizer websites are banned
  7. See references above i.e. Iran banned Tor
  8. US FBI uses 'Anonymizer trap' to catch online pedofiles (Security Focus website)
  9. About targeted advertising on an anonymizer (FastCompany Anonymizer website) - an article describing the typical targeted advertising avoidance by most anonymizer services, while this one enables continued online targeted marketing
  10. "anonymous web crawling". GeoSurf. Retrieved 25 September 2017.
  11. "The hack of the year - Security - Technology - theage.com.au". www.theage.com.au. Retrieved 20 December 2017.
  12. Rainer, R. Kelly; Turban, Efraim (9 January 2008). "Introduction to Information Systems: Supporting and Transforming Business". John Wiley & Sons. p. 379. Retrieved 20 December 2017 via Google Books.
  13. Privacy-friendly law enforcement 2009
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.