What is a Proxy / VPN
What is a proxy?
This is a transit server enabling users to surf the Internet anonymously. Proxy can hide your IP address, unblock access to websites, etc.
What is a VPN?
VPN is a protected virtual private network that can be created over an existing Internet connection for safe and anonymous operation on the Web. All the VPN traffic is encrypted. Devices can connect to a VPN by using protocols: OpenVPN, IPSec, PPTP or L2TP.
Why to use Proxy / VPN?
1) You may want to use quality proxy or socks servers to ensure your anonymity or to mask your IP address.
2) You can use a VPN (Virtual Private Network) if you need an encrypted connection and even more security.
3) To regain access to websites blocked by your provider/network administrator, and to bypass region-specific or IP-specific restrictions.
Types of proxies:
1. HTTP proxy servers. They operate normally via an HTTP protocol or HTTPS/FTP (in some instances) and used in browsers and some popular software.
● Transparent proxies are applied basically for caching data. They do not hide your IP address or a proxy usage fact.
● Anonymous proxies hide an actual IP address, but do not conceal a proxy usage.
● Distorting proxies hide your IP address replacing it with a random IP address. Yet they do not conceal a proxy usage.
● High anonymous (elite) proxy servers conceal an actual IP address and mask their usage. All requests transmitted through the proxy look like direct queries sent by a user’s computer.
2. SOCKS 4/5. These servers operate with nearly all TCP and UDP traffic (SOCKS4 supports TCP only). Some software (FreeCap, SocksCap, Sockschain, etc.) allow to socksify virtually any program. SOCKS forwards data without analyzing it, therefore websites identify you as a common user.
Is Proxy / VPN enough for web anonymity?
Proxies and VPNs do not provide a complete anonymity on the Internet.
There is an array of tools and methods to determine if a user hides his IP address:
1. Browser HTTP headers. Analysis of headers sent by a browser.
2. Flash Leak, Java Leak, WebRTC Leak. Adobe Flash, Java platform and WebRTC plugins (if enabled) can reveal your real IP.
3. DNS Leak. Queries for DNS resolving may bypass a proxy/VPN, which may ultimately reveal your actual location.
4. Fingerprints. Analysis of digital fingerprints of your browser and system.
5. ETag. Comparison of cached Entity Tag identifiers.
6. MTU/MSS/p0f check. Passive methods for TCP/IP stack fingerprinting.
7. Blacklists. Checking an IP address of your proxy/VPN for being in major RBLs (Realtime Blackhole List).
8. System Time. Analysis of a difference between the system time in your OS and a time zone of your IP address.