DragonRider <NoSpam@NoJunkAtAll.com> wrote in
news:fa10gvccrv5afe8or29ahm321fhtqvsh5u@4ax.com:
> On Mon, 30 Jun 2003 09:15:17 +0300, Lance Delacroix
> <lance_delacroix@fastmail.fm> wrote:
>
>>On Sun, 29 Jun 2003 22:22:15 GMT, DragonRider <NoSpam@NoJunkAtAll.com>
>>prounounced a fatwah thus:
>>
>>>On Sun, 29 Jun 2003 20:15:00 +0300, Lance Delacroix
>>><lance_delacroix@fastmail.fm> wrote:
>>>
>>>>On Sun, 29 Jun 2003 15:05:50 GMT, DragonRider
>>>><NoSpam@NoJunkAtAll.com> prounounced a fatwah thus:
>>>>
>>>>>On Sun, 29 Jun 2003 14:14:00 +0300, Lance Delacroix
>>>>><lance_delacroix@fastmail.fm> wrote:
>>>>>
>>>>>>On Sun, 29 Jun 2003 08:05:40 GMT, DragonRider
>>>>>><NoSpam@NoJunkAtAll.com> prounounced a fatwah thus:
>>>>>>
>>>>>>>On 29 Jun 2003 00:01:07 -0700, yosponge@yahoo.com (sponge) wrote:
>>>>>>>
>>>>>>>>On Tue, 24 Jun 2003 21:42:19 -0400, DragonRider
>>>>>>>><NoSpam@NoJunkAtAll.com> wrote:
>>>
>>>>If you are downloading files, you are most certainly receiving (and
>
> [snip]
>
>>>>What is this program that you think is "spoofing" your IP? It is
>>>>not doing what you think it's doing.
>>>
>>>Stealther v2.7
>>
>>Okay, I get it. No ****ing way are you truly hidden. You are
>>relaying through proxy servers, so your IP is hidden from the server
>>that contains the web page you are viewing (and from all but the first
>>server in the relay chain). GRC.com can't find you because it
>>attempts to contact you *directly*, and it can't. Each proxy server
>>in the chain knows where the next one and the previous one are; they
>>relay data back to you just as they relay your requests out. This
>>setup makes you "anonymous" in the sense that you cannot be *easily*
>>and routinely traced. This does enhance your security to a certain
>>extent, no doubt about it, but there is a record of every interaction
>>between every pair of computers in the chain, and the trail leads back
>>to you.
Well yeah, except some of the proxy servers clear their logs monthly or
whatever, so there is some protection. Assuming you routed your
connection through enough servers distributed around the world (to be
immune from legal threats from law enforcement agencies), wouldnt it be
difficult for someone to trace you? I suppose they could just try to hack
the server also for the logs...
Don't send out any death threats. :-)) Also, if grc.com
>>can't find you, saying that you are "stealthed" (in the sense that
>>your ports are closed) is misleading.
Hmm, wouldn't grc think that the person was coming from the closest
annoymous proxy server?
If you are using ipagent to run, you connect to grc directly first, so
grc should bypass all the annoymous servers to get your real ip.
> Hmmm, makes sense. A friend recommended this method as a way to not
> let nasty webpages track me, but this isn't the solution (and I'll
> tell him).
>
> Well, but what can a person do? A firewall doesn't do this, just
> stops people from, supposedly, get into your system.
There is no perfect system. But if you route your connection through
several annoymous proxies all around the world, most ordinary people
would have no chance at all trying to trace you. Perhaps only the most
determined law enforcement agencies and hackers might be able to do it.
> Thanks for all the info. Much appreciated.
>
Aaron
--
Want to learn how to use Winboard and the 150+ free Winboard
Chess engines?Visit http://www.aarontay.per.sg/Winboard/


Reply With Quote