Anonymizer

Anonymizer

An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. [cite web |url=http://www.anonymizer.com/company/about/anonymizer-faq.html |title=Anonymizer FAQ |accessdate=2007-03-13] It accesses the Internet on the user's behalf, protecting personal information by hiding the source computer's identifying information. [cite web |url=http://www.livinginternet.com/i/is_anon_work.htm |title=How Anonymizers Work |accessdate=2007-08-03 |format= |work=The Living Internet]

Purposes

There are many purposes for using anonymizers. Anonymizers help minimize risk. They can be used to expose human rights abuses without retribution, to speak about a taboo without loss of reputation, or to receive information within a repressive regime.

While there are ways in which some Who|date=July 2008 may view the use of this service as abuse, such as when criminals which use anonymizers along with encryption software to securely hide their identity and keep their message hidden from any police or intelligence agencies, there remain many law-abiding citizens who wish to secure their communications from illegal government which snooping Fact|date=July 2008 what in the same manner, protect themselves from identity theft, or protect their search histories in the event of accidental or purposeful public disclosure. Indeed, criminals already have anonymity on the Internet: they can compromise other people's computers, exploit open relays, etc. Anonymity systems aim to provide privacy to law-abiding citizens.

Risks and security

Anonymizers are not entirely secure. If an anonymizer keeps logs of incoming and outgoing connections and the anonymizer is physically located in a country where it is subjected to warrant searches then there is a potential risk that government officials can reverse engineer and identify all users who used the anonymizer and how they used it. Most anonymizers state they do not keep logs but there is currently no way to confirm that. However, if the user used another anonymizer to connect to the exposed anonymizer, that user is still anonymous. This is sometimes called daisy-chaining.

Further, an untrustworthy web based anonymizer is capable of man in the middle attacks. The anonymizer can read, inject, and modify content into the message that the user is sending as well as receiving. The anonymizer can intercept and record private unencrypted information such as username and password credentials, credit card numbers, e-mails, etc. that have been transported using the anonymizer. To avoid this, content should be encrypted and credentials should be exchanged outside of the anonymizer.

For even trustworthy anonymizers, anonymizers cannot filter out any malicious code that may reveal the identity of the user who wishes to remain anonymous. See malware. Care should be taken to prevent information leaks. For example, anonymizing an HTTP connection but not a DNS lookup can reveal the location of the viewer.

Anonymizers also present a high value target. Groups opposite the people who want to remain anonymous target public anonymizers, especially as they are often misused. [cite web |url=http://www.securityfocus.com/news/11486 |title=Embassy leaks highlight pitfalls of Tor |accessdate=2008-02-09]

Use of anonymizers

Protocol specific anonymizers

Sometimes anonymizers are implemented to only work with one particular protocol. The advantage to this is that no extra software is needed. The operation occurs in this manner: A connection is made by the user to the anonymizer. Commands to the anonymizer are included inside a typical message. The anonymizer then makes a connection to the resource specified by the in-band command and relays the message with the command stripped out.

An example of a protocol specific anonymizer is an anonymous remailer for e-mail. Also of note are web proxies and bouncers for FTP and IRC.

Protocol independent anonymizers

Protocol independence can be achieved by creating a tunnel to an anonymizer. The technology to do so varies. Protocols used by anonymizer services may include SOCKS, PPTP, or OpenVPN.

In this case either the desired application must support the tunneling protocol, or a piece of software must be installed to force all connections through the tunnel. Web browsers, FTP and IRC clients often support SOCKS for example, unlike telnet.

Use of multiple relays

One example of "daisy-chained" anonymizing proxies is the "Tor network". Tor is vulnerable to privacy breaches Fact|date=July 2008 what but it is considered to be the best anonymizer platform Fact|date=July 2008. See risks of using anonymous proxy servers.

Another example of multiple relays is sending an e-mail to an anonymizing remailer, which relays it to another remailer, which eventually relays it to its destination.

ee also

*Anonymity — the generic concept
*Anonymization — a more specific concept
*I2P — a peer-to-peer anonymizing network for e-mail, browsing, file sharing, ...
*Anonymous remailer — a similar service for e-mail
*Anonymizer (company) — a company that specializes in anonymizer services
*Proxy server — a basic tool of anonymizers
*Tor (anonymity network) — An onion routing proxy system

References


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • anonymizer — UK [əˈnɒnɪˌmaɪzə(r)] US [əˈnɑnɪˌmaɪzər] noun [countable] [singular anonymizer plural anonymizers] computing a website that allows someone to use the Internet without leav …   Useful english dictionary

  • Anonymizer — Durch Anonymizer kann man vermeiden, im Internet unerwünschte Spuren zu hinterlassen. Die gewünschte Webseite wird nicht direkt angesteuert, sondern über einen Anonymizer (beispielsweise www.anonymizer.com) abgerufen. Dieser leitet die Seite dann …   Online-Wörterbuch Deutsch-Lexikon

  • anonymizer — UK [əˈnɒnɪˌmaɪzə(r)] / US [əˈnɑnɪˌmaɪzər] noun [countable] Word forms anonymizer : singular anonymizer plural anonymizers computing a website that allows someone to use the Internet without leaving any sign of who they are …   English dictionary

  • Anonymizer — Ein Anonymizer bzw. Anonymisierer ist ein System, das Benutzern hilft, ihre Anonymität im Internet, vor allem im World Wide Web zu wahren. Sie sollen damit helfen, Datenschutz und Datensicherheit beim Surfen zu bewahren. In ihrer Funktion ähneln… …   Deutsch Wikipedia

  • Anonymizer — сл. сайт для отправки анонимной почты <http://www.anonymizer.com> …   Hacker's dictionary

  • Anonymizer (company) — Anonymizer, Inc. is an Internet privacy company, founded in 1995 by Lance Cottrell, author of the Mixmaster anonymous remailer. Anonymizer was originally named Infonex Internet. The name was changed to Anonymizer in 1997 when the company acquired …   Wikipedia

  • Lance Cottrell — develops internet anonymizers. Cortell developed the first anonymizer, Anonymizer.com, in 1997 while studying towards a PhD in Astrophysics at UCSD. Cottrell was the original coder for the Mixmaster anonymous remailer and designed version 1… …   Wikipedia

  • Anonymität im Internet — Das derzeitige Internet ermöglicht unterschiedlich weitgehende Anonymität. Eingeschränkt wird diese beispielsweise dadurch, dass bei jeder Kommunikation im Internet eine IP Adresse mitübertragen wird. Auch durch sorgloses Verhalten und technische …   Deutsch Wikipedia

  • AN.ON — JonDo / Java Anon Proxy (JAP) Entwickler: Technische Universität Dresden, Universität Regensburg, JonDos Aktuelle Version: 00.11.012 (27. März 2009) Aktuelle Vorabversion: 00.11.026 Beta Betriebssy …   Deutsch Wikipedia

  • Anonym surfen — Bei Aktivitäten im Internet fühlen sich viele Benutzer anonym. Diese Anonymität ist jedoch nicht total. Ohne Schutzmaßnahmen erfährt die Gegenseite bei der Kommunikation teilweise die IP Adresse des Benutzers. Doch auch Cookies, Browser… …   Deutsch Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”