- Anonymizer
An anonymizer or an anonymous proxy is a tool that attempts to make activity on the
Internet untraceable. [cite web |url=http://www.anonymizer.com/company/about/anonymizer-faq.html |title=Anonymizer FAQ |accessdate=2007-03-13] It accesses the Internet on the user's behalf, protecting personal information by hiding the source computer's identifying information. [cite web |url=http://www.livinginternet.com/i/is_anon_work.htm |title=How Anonymizers Work |accessdate=2007-08-03 |format= |work=The Living Internet]Purposes
There are many purposes for using anonymizers. Anonymizers help minimize risk. They can be used to expose human rights abuses without retribution, to speak about a taboo without loss of reputation, or to receive information within a repressive regime.
While there are ways in which some Who|date=July 2008 may view the use of this service as abuse, such as when criminals which use anonymizers along with
encryption software to securely hide their identity and keep their message hidden from any police or intelligence agencies, there remain many law-abiding citizens who wish to secure their communications from illegal government which snooping Fact|date=July 2008 what in the same manner, protect themselves from identity theft, or protect their search histories in the event of accidental or purposeful public disclosure. Indeed, criminals already have anonymity on the Internet: they can compromise other people's computers, exploit open relays, etc. Anonymity systems aim to provide privacy to law-abiding citizens.Risks and security
Anonymizers are not entirely secure. If an anonymizer keeps logs of incoming and outgoing connections and the anonymizer is physically located in a country where it is subjected to warrant searches then there is a potential risk that government officials can reverse engineer and identify all users who used the anonymizer and how they used it. Most anonymizers state they do not keep logs but there is currently no way to confirm that. However, if the user used another anonymizer to connect to the exposed anonymizer, that user is still anonymous. This is sometimes called daisy-chaining.
Further, an untrustworthy web based anonymizer is capable of man in the middle attacks. The anonymizer can read, inject, and modify content into the message that the user is sending as well as receiving. The anonymizer can intercept and record private unencrypted information such as username and password credentials, credit card numbers, e-mails, etc. that have been transported using the anonymizer. To avoid this, content should be encrypted and credentials should be exchanged outside of the anonymizer.
For even trustworthy anonymizers, anonymizers cannot filter out any malicious code that may reveal the identity of the user who wishes to remain anonymous. See
malware . Care should be taken to prevent information leaks. For example, anonymizing anHTTP connection but not a DNS lookup can reveal the location of the viewer.Anonymizers also present a high value target. Groups opposite the people who want to remain anonymous target public anonymizers, especially as they are often misused. [cite web |url=http://www.securityfocus.com/news/11486 |title=Embassy leaks highlight pitfalls of Tor |accessdate=2008-02-09]
Use of anonymizers
Protocol specific anonymizers
Sometimes anonymizers are implemented to only work with one particular protocol. The advantage to this is that no extra software is needed. The operation occurs in this manner: A connection is made by the user to the anonymizer. Commands to the anonymizer are included inside a typical message. The anonymizer then makes a connection to the resource specified by the in-band command and relays the message with the command stripped out.
An example of a protocol specific anonymizer is an
anonymous remailer for e-mail. Also of note are web proxies and bouncers for FTP and IRC.Protocol independent anonymizers
Protocol independence can be achieved by creating a tunnel to an anonymizer. The technology to do so varies. Protocols used by anonymizer services may include
SOCKS , PPTP, orOpenVPN .In this case either the desired application must support the tunneling protocol, or a piece of software must be installed to force all connections through the tunnel. Web browsers, FTP and IRC clients often support SOCKS for example, unlike
telnet .Use of multiple relays
One example of "daisy-chained" anonymizing proxies is the "Tor network". Tor is vulnerable to privacy breaches Fact|date=July 2008 what but it is considered to be the best anonymizer platform Fact|date=July 2008. See risks of using anonymous proxy servers.
Another example of multiple relays is sending an e-mail to an anonymizing remailer, which relays it to another remailer, which eventually relays it to its destination.
ee also
*
Anonymity — the generic concept
*Anonymization — a more specific concept
*I2P — a peer-to-peer anonymizing network for e-mail, browsing, file sharing, ...
*Anonymous remailer — a similar service fore-mail
*Anonymizer (company) — a company that specializes in anonymizer services
*Proxy server — a basic tool of anonymizers
*Tor (anonymity network) — Anonion routing proxy systemReferences
Wikimedia Foundation. 2010.