How anonymous can proxy servers be?

03.02.20 в 10:00 Other 1493

Working on the Internet through a proxy you may realize, that the proxy does not actually provide anonymity whatsoever.

Well, usually proxy's anonymity does not affect your workflow, but quite sometimes its sudden absence can ruin everything. Therefore, it is important to choose a proxy with the appropriate level of anonymity.

Below we will tell you what types of proxy servers provide certain degree of anonymity, as well as what data the proxy sends to the destination server when connecting to it.

Scheme

What data can proxy send?

When you request certain data from the server, whether you connect via a proxy or directly, your browser sends a number of parameters about you and your device. Data can be essential or optional for correct and effective display of content. However, some of this data may be hidden from the destination server, which determines the degree of anonymity of the proxy.

Here is what data can spoil your anonymity:

  • Client's IP address (your real address)
  • Proxy's IP address (if it is not hidden)
  • Version of your operating system
  • Version of your web browser
  • Some information about browser settings
  • Country and city of the user's location (identified by IP)
  • Contact details of your ISP (identified by IP)
  • Some arbitrary data

Easy accessibility of this almost private information about the user can drastically complicate the performance of certain tasks or disclose your personality on the Internet.

For this reason, there are so-called anonymous proxies that actually hide information its user.

How personal data is transferred. Environment variable

The transfer of the entire array of data from the client to the server takes place in the form of environment variables. In this case, the information is presented in the format of

"Variable Name" = " Value»

The table below shows some examples of these variable values.

Variable name

Example of a variable value

HTTP_HOST

rsocks.net

HTTP_REFERER

www.nulled.to/topic/342649-20000-ips-for-10-a-mont...

HTTP_USER_AGENT

Mozilla/5.0 (Windows NT 6.1; WOW64; rv:6.0.2) Gecko/20100101 Firefox/6.0.2

REMOTE_ADDR

159.138.21.170

HTTP_VIA

159.138.21.170

HTTP_X_FORWARDED_FOR

36.89.180.217


And these are just some of the variables used talking to the server, there are about twenty of them in total. Nonetheless, the proxy may not send some of the variables values that contain the client's personal data. Then a variable with an empty value is passed to the server. Depending on which variables are hidden, a proxy server can be referred to as transparent, anonymous, or elite.

Transparent proxies

Proxies that do not hide the client's real IP address are called transparent. Such proxies cannot be used as an anonymity tool. Instead, they are used for other purposes, such as caching traffic or configuring and controlling Internet access for corporate network clients.

Thus transparent proxies do not hide values of the following variables:

REMOTE_ADDR – the IP address from which the server is actually accessed;
HTTP_VIA – the IP address of the proxy;

HTTP_X_FORWARDED_FOR – the real IP address of the client;

Proxy

What are anonymous proxy servers?

In addition to transparent proxy servers, you can find more common anonymous proxies. They are called anonymous because they hide any information about their client from the final recipient. Depending on the amount of masked data, anonymous proxies are divided into regular anonymous, distorting, and elite ones.

A regular anonymous proxy differs from a transparent one only in that the actual IP address of the client is not contained within http_x_forwarded_for variable, but is replaced by the address of the proxy itself. In this case the variables have the same values:

REMOTE_ADDR – proxy IP address;
HTTP_VIA-proxy IP address;
HTTP_X_FORWARDED_FOR – proxy IP address;

In this case, the use of a proxy in an attempt to conceal the client's real address is obvious, but if the web server allows connections through a proxy, then its use is justified.

A distorting proxy differs slightly from a regular anonymous proxy in that the client's address is replaced with a randomly generated IP address instead of the proxy itself, which gives a slightly higher level of anonymity:

REMOTE_ADDR – proxy IP address;
HTTP_VIA – proxy IP address;
HTTP_X_FORWARDED_FOR – randomly generated IP address;

For tasks that require the highest level of anonymity, elite proxies must be used. In addition to hiding the client's address, these proxies disguise their very use and pass empty variable values, as if connecting to the target site directly, without mediation:

REMOTE_ADDR – IP address of the elite proxy server;
HTTP_VIA – empty variable value;
HTTP_X_FORWARDED_FOR – empty variable value;

Such proxies can be used to work with resources that have strict access rules and block users who are caught hiding their real IP address.

Choosing the right solution among proxy services, you should clearly understand what requirements the proxy must meet in order to successfully work with the resources you need, and you will be able to find the optimum option for you.

评论

登录来发表评论
热门

伴随着会联网的广泛使用,随之带来一系列的危险。首先涉及到匿名和安全性。如果信息不设防范手段,您的数据很可能被入侵 — 这里举个例子,关于在公用网络中的私人的信件。

最初的互联网预想让空间没有国界化,无论在在那里都可以绝对匿名地获取任何信息。现在很多国家都出现了禁止访问某些资源的情况 。

25日
12月 2017

当今世界保证私人和企业的秘密数据变得越来越困难,所以信息安全的问题变得的越演越烈。每个人都拥有生存、自由和人身安全的权力。保护自己的数据免受入侵,和第三方的调查是没有任何原因的。如果您想在网络上安全地保存自己的信息,就不得不去遵守那些规则。本文就来介绍下基本的方法、手段和常用的程序,当然最主要的是互联网的安全使用。

In the recent past by the standards of the development of information technologies, in 2015 Google created artificial intelligence based on neural networks, which was able to analyze the condition around itself and draw conclusions about its further education. The name of the new offspring from Google was given in abbreviated from the term "deep Q-network" - DQN. The DQN started training in common arcade games (Pakman, Tennis, Space Invaiders, Boksing and other classics).

Good afternoon! Now we are talking about such an important topic in our time, as an opportunity to bypass the blocking of sites. The problem is very relevant in our country

最新

The article briefly describes the principles of using proxies, choosing the appropriate type and degree of anonymity. It also describes the main areas of using anonymous proxies and their requirements.

Hiding a user's IP address on the Web is not that difficult. Many methods have been developed for this purpose. In this article, we reviewed the most popular ones. What is the difference between a proxy and a VPN? Why does the TOR network provide high anonymity? You can read all this here!

25日
2月 2020

In this article, you will find a brief description of the data parsing, its stages, and an explanation of using proxy packages to successfully bypass the protection of web resources.

If you want to be anonymous on the Internet, but you haven’t yet figured out what to pay attention to when choosing a proxy, then after reading this article, you will get all the basic information for a quick start in this area.

What is the Internet Protocol or IP and why is it essential for the Internet to function? What is the difference between IPv4 and IPv6 and how to stick to the newer protocol faster? We'll answer these and other questions in this article.

联系我们
技术支持
王李
有问题吗?

在这儿点击,我们就回答