Networks of Proxies

Standard

 

Proxies

 

New Fresh Proxies or servers are machines relaying your requests online. There are free and new fresh proxies open available to everybody and there are private proxies protected by password.

 

We can be technically split proxies into 2 types. Http proxies, and socks proxies.

 

HTTP proxies

 

HTTP proxies are based on the HTTP protocol. It is also noted that only Anonymous HTTP proxies hide your IP as others provide your IP address as well as their own via the HTTP_X_FORWARDED_FOR field.

 

These new fresh proxies can be implemented in two different ways: either they are accessible via a web browser (you have a page where you enter the URL of the site that you want to visit, which is rather restrictive), or it needs to be connect directly (transparent proxies).

 

HTTP proxies can be used on the HTTP protocol. You can only view Web pages through them.

 

HTTP proxies are preferred over HTTP proxies because your packets are encrypted which prevents your ISP to know what you are doing. HTTP proxies are almost useless unless you only want to hide your IP address to which you want to connect as your ISP can monitor without any problem what you do.

 

Socks proxies

 

Socks proxies are more sophisticated than HTTP proxies. They are based on the Socks protocol situated itself on the TCP protocol. This protocol is currently available in 3 versions: Socks 4, Socks 4a and Socks 5.

 

Keep in mind that all traffic passing through a proxy is recorded in the logs (required by law) and the proxy administrator can spy on all traffic passing through its proxy or set up a type attack man in the middle.

 

Networks of proxies

 

Networks have new fresh proxies in place to ensure freedom of expression on the Internet and to allow Internet users located in countries where the internet is heavily censored and unwelcome political views to express themselves freely on the network and to inform without the state can determine their identity (or block their requests).

 

Many of these networks exploit the principle of peer to peer networks; each user becomes a node to connect to others through his machine. Some of these networks are specialized in certain tasks.

 

These networks are the best way to be anonymous on the net if you take the trouble to understand their limits and if used for that reason they were created.