On Sun, 29 Jun 2003 22:22:15 GMT, DragonRider <NoSpam@NoJunkAtAll.com>
prounounced a fatwah thus:

>On Sun, 29 Jun 2003 20:15:00 +0300, Lance Delacroix
><lance_delacroix@fastmail.fm> wrote:
>
>>On Sun, 29 Jun 2003 15:05:50 GMT, DragonRider <NoSpam@NoJunkAtAll.com>
>>prounounced a fatwah thus:
>>
>>>On Sun, 29 Jun 2003 14:14:00 +0300, Lance Delacroix
>>><lance_delacroix@fastmail.fm> wrote:
>>>
>>>>On Sun, 29 Jun 2003 08:05:40 GMT, DragonRider <NoSpam@NoJunkAtAll.com>
>>>>prounounced a fatwah thus:
>>>>
>>>>>On 29 Jun 2003 00:01:07 -0700, yosponge@yahoo.com (sponge) wrote:
>>>>>
>>>>>>On Tue, 24 Jun 2003 21:42:19 -0400, DragonRider
>>>>>><NoSpam@NoJunkAtAll.com> wrote:

>
>>If you are downloading files, you are most certainly receiving (and
>>sending) data in neat little labeled bundles called packets. Each one
>>of those packets is marked with your IP address and a port number that
>>was negotiated in an exchange of info between your computer and the
>>sending computer. Without the sending computer (and all intermediate
>>computers) having your IP address, you simply cannot receive data.
>>
>>What is this program that you think is "spoofing" your IP? It is not
>>doing what you think it's doing.

>
>Stealther v2.7


Okay, I get it. No ****ing way are you truly hidden. You are
relaying through proxy servers, so your IP is hidden from the server
that contains the web page you are viewing (and from all but the first
server in the relay chain). GRC.com can't find you because it
attempts to contact you *directly*, and it can't. Each proxy server
in the chain knows where the next one and the previous one are; they
relay data back to you just as they relay your requests out. This
setup makes you "anonymous" in the sense that you cannot be *easily*
and routinely traced. This does enhance your security to a certain
extent, no doubt about it, but there is a record of every interaction
between every pair of computers in the chain, and the trail leads back
to you. Don't send out any death threats. :-)) Also, if grc.com
can't find you, saying that you are "stealthed" (in the sense that
your ports are closed) is misleading.

>
>>Topics to Google up:
>>
>>packet switching
>>circuit switching
>>TCP/IP (Transmission Control Protocol / Internet Protocol)