Anonymous Surfing with Java Anonymous Proxy GHOST SURFING

Total Page:16

File Type:pdf, Size:1020Kb

Anonymous Surfing with Java Anonymous Proxy GHOST SURFING KNOW-HOW Java Anonymous Proxy Anonymous surfing with Java Anonymous Proxy GHOST SURFING Many Websites log IP addresses and access times to identify users. If you don’t want to wind up as data in someone’s market research, the Java Anonymous Proxy will keep your surfing secret. BY TOBIAS EGGENDORFER nless you happen to be a VIP, anonymization service. An anonymiza- Users employ a variety of techniques you can drop into a baker’s shop tion service is a service that lets the user for surfing on the Internet without detec- Uanywhere but in your own home surf the web anonymously. The service tion (see the box titled “Private Surfing”.) town and pay cash for a loaf of bread obscures the user’s true IP address, pre- One popular privacy tool is Java Anony- without revealing your personal data. venting snoopers from following the user mous Proxy (JAP) [1], a portable proxy Nobody will record the way you move or around the web. that supports anonymization in Linux. attempt to discover your behavior pat- terns. In day-to-day life, anonymity is Cookies and Anonymity the rule. In contrast, the Internet allows JAP gives you maximum anonymity, but Many Websites require cookies to work seamless logging of visitor traffic on imprudent handling of cookies can endan- properly, so you may not be able to get websites. ger your privacy. Many Websites set cook- away with disabling them completely. This continuous data collection allows ies, which they use to identify returning This said, most browsers give you the for unique visitor identification; all it visitors. This is not a big issue assuming option of restricting the validity of any takes to identify a user is a short phone that cookies are set while you are surfing cookies to the current browser session. call to your provider, who is easily iden- anonymously. But if you provide user data, When you close the browser, the cookies or if cookies from previous sessions pre- are deleted, thus removing the danger of tified via a whois entry, to get your per- exist in your browser, any protection JAP inadvertent identification. sonal data. Governments have passed can give you is compromised. The remote Solutions such as Cookiecooker [9] are laws to prevent the most extreme misap- Web server will still be able to identify you suitable for mixing cookies from ad serv- propriation of personal data, but Internet despite the anonymization service. ers, but they can also lead to you being users with static IP addresses are still To help mitigate the risk, you could install incorrectly identified. Although Cook- easily identified on the web through a two browsers, one for anonymous surf- iecooker provides some protection simple whois request. ing and the other for “public” surfing. against this, there is always the danger To protect your privacy, you need to This would avoid mixing cookies and of ending up hijacking somebody else’s bring in heavy artillery in the form of an would reduce the risk of identification. session. 44 ISSUE 60 NOVEMBER 2005 WWW.LINUX - MAGAZINE.COM Java Anonymous Proxy KNOW-HOW control of a mix somewhere in mid- 1x encrypted 2x encrypted stream, there is nothing the attacker can do with the sniffed data. As multiple Response users route their data packets through each cascade, each cascade contains a nicely stirred cocktail of packets from y 1 2 G different users, preventing any conclu- JAP Mix Mix G G Prox Browser G E E E E T Webserver sions about the packet order. T T T Do you have neighbors who take GET URI 2x encrypted 1x encrypted delivery of a parcel in your absence and Time then hand it over to you saying “Hey, big Ideal: On the same computer parcel you got there” before going on to Figure 1: The message is encrypted separately for each mix, like a letter in multiple envelopes, speculate about what it could be? JAP and progresses through the mix cascade to improve anonymity. puts an end to this kind of speculation by chopping the data into 998-byte JAP encrypts all requests and sends them If a mix in this cascade decrypts a chunks and padding smaller chunks to a mix – an intermediate system on the message sent to it, it can only see the with random data. Internet that mixes user data from several cypher text for the next mix. As every Just like PGP or SSL, JAP relies on a sources. The data bounces through sev- mix uses a different key, a high level of mixture of symmetric and asymmetric eral mixes before finally reaching a proxy privacy is assured. It that sends the request to the web server. is like putting a letter This article describes how you can surf in a number of secretly with JAP. opaque envelopes. Each mix can only Understanding JAP open one envelope The underlying principle behind JAP is (Figure 1). simple: data passes from the web client This design pro- through a chain of several mixes before vides an additional reaching a proxy server. At each step, benefit: as outgoing the data is mixed with data from other messages always look users. The packets are also encrypted at different from incom- each step. The proxy encrypts the mes- ing messages, there is sage in a way that the last mix can no way of mapping decrypt it. The last mix takes the cypher incoming packets to text and encrypts it to allow the last-but- outgoing packets. one mix to read it. The results are then Even if an attacker re-encrypted for the last-but-two mix, were to sniff a mix’s Figure 2: The proxy is easy to set up on the browser-side. You can and so on. traffic stream or take reconfigure the default port of 4001 in JAP. JAP Transmission The data exchange between JAP and the dom channel ID. The new channel relies padded with 16 random bytes to take it mix, or between mixes in the chain, uses on a symmetric key, the asymmetric, RSA up to the standard size. The mix again a standard format. Each packet has a size encrypted version of which is stored in encrypts the first 128 bytes with the next of 998 bytes, and header flags are used to the first 128 bytes of the data packet. The mix’s key. If the open flag is not set, the specify important information. rest of the packet is encrypted symmetri- key exchange does not take place. This The 32-bit channel ID is the most impor- cally using AES. increases the size of the packet’s payload tant bit of information; the ID assigns the The payload has a 3-byte header that component. mix packet to a mix channel. The channel specifies the exact length (2 bytes) and the Mixes set the close flag in the header to ID always occupies the first 4 bytes of a user data type (1 byte). This data type can close a connection and pad the data com- mix packet. This is followed by 2 bytes, 5 be FTP or HTTP. The last mix in a cascade ponent with 992 random bytes. When- of which are used for flags. The flags identifies a suitable proxy based on the ever a mix receives a packet of this kind, it describe the makeup of the data packet. data type. drops the channel ID and the matching The remaining 11 bits are reserved for The asymmetric part is the interesting bit symmetric key. The packet also tells JAP possible future extensions. The channel here. The first 16 bytes contain the 128-bit that all data have been transmitted and ID uniquely identifies the link between key used for symmetric encryption by closes the TCP connection to the browser. JAP and the mix, or between two mixes. each mix. To allow the next mix to learn To prevent attackers from deducing the The open flag (bit 45) is set on establish- its key, all the data in the packet are left packet type from the header data, mixes ing a connection to specify a new, ran- shifted by 16 bytes, and the data packet is also encrypt the header. WWW.LINUX - MAGAZINE.COM ISSUE 60 NOVEMBER 2005 45 KNOW-HOW Java Anonymous Proxy encryption for communication between your local network, you will need to for Linux. Compared with the relatively mixes and the local proxy. JAP encrypts enable the Forwarder to give other complex technology on which the JAP is messages to the mixes with random machines access. based, JAP is very easy to install and symmetric session keys. On first contact, use. Once you have installed JAP on the symmetric key is then encrypted Choosing a Cascade your own system, you can test your con- asymmetrically using the mix’s public The other settings, which you can access figuration using the testing service pro- key. via the Settings or Details buttons, are vided at [8]. ■ self-explanatory. The only question JAP Installation newcomers then face is the choice of the INFO Despite its apparent complexity, JAP is best available cascades. [1] Java Anonymous Proxy (JAP): simple to install and use. Just download Cascades define your degree of ano- http:// anon. inf. tu-dresden. de/ index_ the JAP version that matches your own nymity: the more users that populate a en. html Java version from [1]. To discover your cascade, and the bigger the cocktail of [2] The Cloak: http:// www. the-cloak. com Java version type: packets, the more difficult it becomes to [3] Guardster: http:// www.
Recommended publications
  • Copyrighted Material
    Anonymizing 1 Your Activities In our daily lives we like to have a certain level of privacy. We have curtains on our win- dows, doors for our offices, and even special screen protectors for computers to keep out prying eyes. This idea of wanting privacy also extends to the use of the Internet. We do not want people knowing what we typed in Google, what we said in our Instant Message conversations, or what websites we visited. Unfortunately, your private information is largely available if someone is watching. When doing any number of things on the Internet, there are plenty of reasons you might want to go incognito. However, that does not mean you’re doing anything wrong or illegal. he justification for anonymity when researching malware and bad guys is pretty Tstraightforward. You do not want information to show up in logs and other records that might tie back to you or your organization. For example, let’s say you work at a finan- cial firm and you recently detected that a banking trojan infected several of your systems. You collected malicious domain names, IP addresses, and other data related to the malware. The next steps you take in your research may lead you to websites owned by the criminals. As a result, if you are not taking precautions to stay anonymous, your IP address will show up in various logs and be visible to miscreants. If the criminals can identify you or the organization from which you conduct your research, they may COPYRIGHTEDchange tactics or go into hiding, MATERIAL thus spoiling your investigation.
    [Show full text]
  • Free Cgi Proxy Script
    Free cgi proxy script click here to download There have been many other proxy software scripts in the past, such as Glype, PHProxy, CGIProxy, Surrogafier, ASProxy, Zelune but all have either perished. This CGI script (or other) acts as an HTTP, HTTPS, or FTP proxy. Here's a demo (username "free", password "speech"), that lets you browse. Surf the web with phpMyProxy. phpMyProxy is a free, light and powerful php proxy script programed by www.doorway.ru If you use this template, keep the link to Free CSS Templates intact. cgi proxy script free download. Guacamole Install Script The script installs dependencies and configure the OS automatically for you in order to obtain. FREE CGI Web Proxy List contains list of cgi/php proxies that are publicly accessed at the moment. Public CGI (Web, PHP) anonymous proxy free list. WEB/WWW servers) servers running a proxy in the form of a CGI script/program (Common. Are you looking to start your own PHP/CGI/Perl web proxy site? We have created an up-to-date list of free and working web-based proxy scripts available for. Proxy website with hosted proxy bypass scripts. Proxy scripts (also known as CGI proxies) work by modifiying the content of the requested page to send subsequent requests back to All are powerful, easily customizable and free. Download CGIProxy. This CGI script (or other) acts as an HTTP, HTTPS, or FTP proxy. Through it, you can retrieve any resource that is accessible from the. start your proxy site with these 3 great free proxy scripts.
    [Show full text]
  • Handbook for Bloggers and Cyber-Dissidents
    HANDBOOK FOR BLOGGERS AND CYBER-DISSIDENTS REPORTERS WITHOUT BORDERS MARCH 2008 Файл загружен с http://www.ifap.ru HANDBOOK FOR BLOGGERS AND CYBER-DISSIDENTS CONTENTS © 2008 Reporters Without Borders 04 BLOGGERS, A NEW SOURCE OF NEWS Clothilde Le Coz 07 WHAT’S A BLOG ? LeMondedublog.com 08 THE LANGUAGE OF BLOGGING LeMondedublog.com 10 CHOOSING THE BEST TOOL Cyril Fiévet, Marc-Olivier Peyer and LeMondedublog.com 16 HOW TO SET UP AND RUN A BLOG The Wordpress system 22 WHAT ETHICS SHOULD BLOGUEURS HAVE ? Dan Gillmor 26 GETTING YOUR BLOG PICKED UP BY SEARCH-ENGINES Olivier Andrieu 32 WHAT REALLY MAKES A BLOG SHINE ? Mark Glaser 36 P ERSONAL ACCOUNTS • SWITZERLAND: “” Picidae 40 • EGYPT: “When the line between journalist and activist disappears” Wael Abbas 43 • THAILAND : “The Web was not designed for bloggers” Jotman 46 HOW TO BLOG ANONYMOUSLY WITH WORDPRESS AND TOR Ethan Zuckerman 54 TECHNICAL WAYS TO GET ROUND CENSORSHIP Nart Villeneuve 71 ENS URING YOUR E-MAIL IS TRULY PRIVATE Ludovic Pierrat 75 TH E 2008 GOLDEN SCISSORS OF CYBER-CENSORSHIP Clothilde Le Coz 3 I REPORTERS WITHOUT BORDERS INTRODUCTION BLOGGERS, A NEW SOURCE OF NEWS By Clothilde Le Coz B loggers cause anxiety. Governments are wary of these men and women, who are posting news, without being professional journalists. Worse, bloggers sometimes raise sensitive issues which the media, now known as "tradition- al", do not dare cover. Blogs have in some countries become a source of news in their own right. Nearly 120,000 blogs are created every day. Certainly the blogosphere is not just adorned by gems of courage and truth.
    [Show full text]
  • 20141228-Spiegel-Overview on Internet Anonymization Services On
    (C//REL) Internet Anonymity 2011 TOP SECRET//COMINT REL TO USA,FVEY Jt * (C//REL) What is Internet Anonymity? (U) Many Possible Meanings/Interpretations (S//REL) Simply Not Using Real Name for Email (S//REL) Private Forum with Unadvertised Existence (S//REL) Unbeatable Endpoint on Internet (S//REL) This Talk Concerns Endpoint Location (S//REL) The Network Address (IP Address) is Crucial (S//REL) It is Not Always Sufficient, However • (S//REL) Dynamic IP Address • (S//REL) Mobile Device TOP SECRET//COMINT REL TO USA,FVEY FT ^I^hHHPPI^^B äim f (C//REL) What is Internet Anonymity? (S//REL) Anonymity Is Not Simply Encryption (S//REL) Encryption Can Simply Hide Content (S//REL) Anonymity Masks the MetaData and hence association with user (S//SI//REL) Importance of MetaData to SIGINT post-2001 can not be overstated (S//REL) There is also anonymity specifically for publishing information (S//REL) Beyond the Scope of this Talk! (U) Anonymity is the antithesis of most business transactions (but encryption may be crucial) (U) Authentication for monetary exchange (U) Marketing wants to know customer well (U) The same goes for Taxing Authorities :-) TOP SECRET//COMINT REL TO USA,FVEY 3 A j. • " * (C//REL) Who Wants Internet ity2 Vm k m j®- * k (U) All Technology is Dual-Use - (U) Nuclear Weapon to Plug Oil Well - (U) Homicide by Hammer (U) Internet Anonymity for Good T - (U) Anonymous Surveys (Ex: Diseases) - (U) Human Rights Bloggers - (U) HUMINT Sources TOP SECRET//COMINT REL TO USA,FVEY 4 , A - Jt (C//REL) Who Wants Internet m •A w (U) Internet
    [Show full text]
  • Rapport Internet 2004 Gb
    HANDBOOK FOR BLOGGERS AND CYBER-DISSIDENTS REPORTERS WITHOUT BORDERS MARCH 2008 HANDBOOK FOR BLOGGERS AND CYBER-DISSIDENTS REPORTERS WITHOUT BORDERS HANDBOOK FOR BLOGGERS AND CYBER-DISSIDENTS CONTENTS © 2008 Reporters Without Borders 04 BLOGGERS, A NEW SOURCE OF NEWS Clothilde Le Coz 07 WHAT’S A BLOG ? LeMondedublog.com 08 THE LANGUAGE OF BLOGGING LeMondedublog.com 10 CHOOSING THE BEST TOOL Cyril Fiévet, Marc-Olivier Peyer and LeMondedublog.com 16 HOW TO SET UP AND RUN A BLOG The Wordpress system 22 WHAT ETHICS SHOULD BLOGUEURS HAVE ? Dan Gillmor 26 GETTING YOUR BLOG PICKED UP BY SEARCH-ENGINES Olivier Andrieu 32 WHAT REALLY MAKES A BLOG SHINE ? Mark Glaser 36 PERSONAL ACCOUNTS • SWITZERLAND: “” Picidae 40 • EGYPT: “When the line between journalist and activist disappears” Wael Abbas 43 • THAILAND : “The Web was not designed for bloggers” Jotman 46 HOW TO BLOG ANONYMOUSLY WITH WORDPRESS AND TOR Ethan Zuckerman 54 TECHNICAL WAYS TO GET ROUND CENSORSHIP Nart Villeneuve 71 ENSURING YOUR E-MAIL IS TRULY PRIVATE Ludovic Pierrat 75 THE 2008 GOLDEN SCISSORS OF CYBER-CENSORSHIP Clothilde Le Coz 3 I REPORTERS WITHOUT BORDERS mine INTRODUCTION BLOGGERS, A NEW SOURCE OF NEWS By Clothilde Le Coz B loggers cause anxiety. Governments are wary of these men and women, who are posting news, without being professional journalists. Worse, bloggers sometimes raise sensitive issues which the media, now known as "tradition- al", do not dare cover. Blogs have in some countries become a source of news in their own right. Nearly 120,000 blogs are created every day. Certainly the blogosphere is not just adorned by gems of courage and truth.
    [Show full text]
  • Privacy Enhancing Technologies for the Internet III: Ten Years Later
    Privacy Enhancing Technologies for the Internet III: Ten Years Later Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo Waterloo, ON [email protected] 1 Introduction In 1997 with Wagner and Brewer, and again in 2002, we looked at the then-current state of privacy-enhancing technologies (PETs) for the Internet. [27, 26] Now, in 2007, we take a third look. Technologies to help users maintain their privacy online are as important today as ever before—if not more so. Identity theft is the fastest-growing crime in the US today [47] and it is all too easy for would-be identity thieves to harvest personal information from the online trails Internet users leave every day. Losses of large databases of personal information are an almost daily occurrence [2]; for example, retailers’ servers are penetrated [44], databases are traded between government and private companies [36] and laptops containing social security numbers are stolen [35]. In 1997, we discussed the dossier effect: all available information about a person gets cross-referenced, and the resulting dossier ends up being used for many purposes, lawful and not. This practice has expanded over the years; the companies that compile and sell these dossiers are known as data brokers. Choicepoint is a prime example—in 2005, this data broker sold dossiers on over 150,000 Americans to a group of criminals. [10] The PETs we discuss here give people a way to control how much of their personal information is revealed when they use the Internet. By controlling the spread of this information, they can limit the size of the data brokers’ dossiers about them.
    [Show full text]
  • Nomadix Alloc8 Appliance User Manual
    Alloc8 Appliance User Manual ExOS Version 7.4 © 2015 Nomadix, Inc. 2 Copyright © 2015 Nomadix, Inc. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Document Built on Wednesday, December 23, 2015 at 4:01 PM Using this guide Before using this guide, become familiar with the Nomadix documentation system. n "Nomadix documentation conventions" on page 2 n "Notes, Tips, Examples, and Cautions" on page 3 Nomadix documentation conventions The Nomadix documentation uses the following conventions in the documentation. Graphical interface conventions The following is a summary of the conventions used for graphic interfaces such as those in the Nomadix Web UI and the Central Management Technical Preview UI. Convention Definition bold Interface element such as buttons or menus.
    [Show full text]
  • The Tor Network: a Global Inquiry Into the Legal Status of Anonymity Networks
    Washington University Global Studies Law Review Volume 11 Issue 3 2012 The Tor Network: A Global Inquiry into the Legal Status of Anonymity Networks Keith D. Watson Washington University School of Law Follow this and additional works at: https://openscholarship.wustl.edu/law_globalstudies Part of the Comparative and Foreign Law Commons, and the Internet Law Commons Recommended Citation Keith D. Watson, The Tor Network: A Global Inquiry into the Legal Status of Anonymity Networks, 11 WASH. U. GLOBAL STUD. L. REV. 715 (2012), https://openscholarship.wustl.edu/law_globalstudies/vol11/iss3/6 This Note is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Global Studies Law Review by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. THE TOR NETWORK: A GLOBAL INQUIRY INTO THE LEGAL STATUS OF ANONYMITY NETWORKS I. INTRODUCTION On July 29, 2010, Jacob Appelbaum, the only known American member of the whistle-blowing organization WikiLeaks, was detained by U.S. agents as he attempted to reenter the country.1 The agents frisked him, searched his bag, photocopied his receipts, and inspected his laptop.2 Appelbaum was questioned about WikiLeaks, which leaked numerous classified government documents relating to the war in Afghanistan only days earlier.3 The agents also questioned him about his views on the United States‘ involvement in Afghanistan and Iraq and his knowledge of the whereabouts of WikiLeaks founder Julian Assange.4 Since then, 1. Nathaniel Rich, The Most Dangerous Man in Cyberspace, ROLLING STONE, Sept.
    [Show full text]
  • CSCI 1800 Cybersecurity and International Relations
    CSCI 1800 Cybersecurity and International Relations Attribution and Privacy John E. Savage Brown University Outline • Review of types of cyber attacks • Attribution problem • Methods to avoid attribution • Detecting attribution • Alternatives to attribution • Intro to deterrence on the Internet • The impersonation problem • Based on – Untangling Attribution, Clark and Landau, Procs. Workshop on Deterring Cyberattacks, National Research Council, 2010. – A Survey of Challenges in Attribution, Boebert, Procs. Workshop on Deterring Cyberattacks, National Research Council, 2010. Lect 08 2/24/20 © JE Savage 2 Types of Internet-Based Attacks • Distributed denial of service (DDoS) – botnet based – Goal: Overwhelm with data, possibly using amplification • Penetration attacks – uses malicious functionality – Goal: Control the machine that is attacked. • EXploitation attacks – a penetration attack – Goal: Penetrate to eXtract valuable information • Destructive attacks – a penetration attack – Goal: Destroy/disrupt valuable system component or attached resource, either temporarily or permanently. Lect 08 2/24/20 © JE Savage 3 The Attribution Problem “On the Internet, nobody knows that you’re a dog.” Lect 08 2/24/20 © JE Savage 4 The Attribution Problem • Attribution important in deterring attacks. – If attribution of attacker were known to be easy, attackers may be deterred by threat of retribution. • Attribution is known to be hard. Why is it? – Technical attribution • Who owns the attacking machine? • Where is the machine located? • Is the attacker hiding behind a proXy? – Human attribution • Who launched the attack? • For whom was that person acting? Lect 08 2/24/20 © JE Savage 5 Coping with Attacks • Distributed Denial of Service (DDoS) attacks – Difficult to stop. Attribution not very helpful given that it must be stopped ASAP.
    [Show full text]
  • An Anonymous and Distributed Personalization Architecture Antoine Boutet, Davide Frey, Arnaud Jégou, Anne-Marie Kermarrec, Heverson Borba Ribeiro
    FreeRec: an Anonymous and Distributed Personalization Architecture Antoine Boutet, Davide Frey, Arnaud Jégou, Anne-Marie Kermarrec, Heverson Borba Ribeiro To cite this version: Antoine Boutet, Davide Frey, Arnaud Jégou, Anne-Marie Kermarrec, Heverson Borba Ribeiro. FreeRec: an Anonymous and Distributed Personalization Architecture. [Technical Report] 2013, pp.20. hal-00844813 HAL Id: hal-00844813 https://hal.inria.fr/hal-00844813 Submitted on 16 Jul 2013 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. FreeRec: an Anonymous and Distributed Personalization Architecture Antoine Boutet1, Davide Frey1, Arnaud J´egou1, Anne-Marie Kermarrec1;2, and Heverson B. Ribeiro1 1 INRIA Rennes, France [email protected], [email protected], [email protected], [email protected], [email protected] 2 EPFL, Switzerland Abstract. We present and evaluate FreeRec, an anonymous decentral- ized peer-to-peer architecture, designed to bring personalization while protecting the privacy of its users. FreeRec's decentralized approach makes it independent of any entity wishing to collect personal data about users. At the same time, its onion-routing-like gossip-based overlay protocols effectively hide the association between users and their inter- est profiles without affecting the quality of personalization.
    [Show full text]
  • Traffic Classification for the Detection of Anonymous Web Proxy Routing
    Traffic Classification for the Detection of Anonymous Web Proxy Routing Shane Miller School of Computing, Engineering & Intelligent Systems Faculty of Computing & Engineering Ulster University, Magee A thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy I confirm that the word count of this thesis is less than 100,000 2 Contents CONTENTS ........................................................................................................................................ 2 ACKNOWLEDGEMENTS .................................................................................................................... 5 ABSTRACT ........................................................................................................................................ 6 ABBREVIATIONS ............................................................................................................................... 7 LIST OF FIGURES ............................................................................................................................... 9 LIST OF TABLES ............................................................................................................................... 10 1. INTRODUCTION ......................................................................................................................... 11 1.1 DETECTING AND BLOCKING ANONYMOUS COMMUNICATIONS .................................................................. 13 1.2 PROBLEM STATEMENT ...................................................................................................................
    [Show full text]
  • Hiding Your IP Address, Anonymous Internet Surfing HOWTO Pagina 1
    Hiding Your IP Address, Anonymous Internet Surfing HOWTO Pagina 1 Hiding Your IP Address CGI/ LOGIN LISTS NEW .TXT CHK GEO ANON HTTPS EMAIL RELAY HEAD WHOIS DOCS HOWTO LINKS BBOARD WEB Hiding Your IP Address Using HTTP, CONNECT, CGI/PHP/WEB, SOCKS proxies Anonymous Internet Surfing HOWTO You could try reading about wingates, socks and proxies (oh before i forget, turn off java, javascript, cookies, what's related, and smart update ... if you are using IE you're not very smart). Also try installing a firewall, or DHCP or you can learn from me! There are situations in which you may want to visit a site without leaving a trace of the visit. For instance you want to check what's going on at your competitor's site. Your visit will generate a record in the log file. Frequent visits will generate many records. Do you want to know what kind of records? See in YOUR REQUEST, YOUR WHOIS RECORD and GEOGRAPHIC LOCATION, Privacy Analysis of your Internet Connection, Another Privacy Investigation Report, BrowserSpy Info, ShowMyIP - will tell you some scary info about what can be told about your computer via the internet. Note that these tests are not very sophisticated. A dedicated "snooper" can often learn much more. Once I came across a server that tried to connect to my computer's disk while I was browsing ... that was an exciting experince. You should also remember about things like cookies, hostile applets and java scripts, browser security holes and so on. So why don't we send someone instead of ourselves? Good idea.
    [Show full text]