Free Capitalist Network - Community Archive
Mises Community Archive
An online community for fans of Austrian economics and libertarianism, featuring forums, user blogs, and more.

Anyone know any safe proxies?

rated by 0 users
This post has 16 Replies | 4 Followers

Top 500 Contributor
Male
Posts 183
Points 3,740
EmbraceLiberty Posted: Sat, Jan 5 2013 9:15 PM

I know a lot of people here are computer wonks and was wondering if anyone could recommend a good proxy to me.

  • | Post Points: 35
Top 10 Contributor
Posts 6,953
Points 118,135

Define "safe proxy" and "good proxy".

 

  • | Post Points: 20
Top 500 Contributor
Male
Posts 183
Points 3,740

Any proxy that isn't recording my typing and tracking my browsing.

  • | Post Points: 35
Top 75 Contributor
Male
Posts 1,018
Points 17,760

you can use tor.

its a network of servers so it is very hard to track, but dont do anything bad on it!

“Since people are concerned that ‘X’ will not be provided, ‘X’ will naturally be provided by those who are concerned by its absence."
"The sweetest of minds can harbor the harshest of men.”

http://voluntaryistreader.wordpress.org

  • | Post Points: 20
Top 500 Contributor
Male
Posts 183
Points 3,740

Do you use it Kelvin?

  • | Post Points: 20
Top 75 Contributor
Male
Posts 1,018
Points 17,760

Sometimes.

“Since people are concerned that ‘X’ will not be provided, ‘X’ will naturally be provided by those who are concerned by its absence."
"The sweetest of minds can harbor the harshest of men.”

http://voluntaryistreader.wordpress.org

  • | Post Points: 20
Top 500 Contributor
Male
Posts 183
Points 3,740

IDK if I want to know about the times you use it for.

  • | Post Points: 20
Top 10 Contributor
Posts 6,953
Points 118,135

Well, there isn't exactly a way to "record typing" without actual keylogging software installed in the machine.  A simple proxy isn't going to be able to do that (unless of course you visit a malicious fake site, posing as a proxy, and then malware gets access to your machine either through an exploit or from you manually downloading it.) 

As for tracking your browsing, as long as you're using secure connections end to end (and you're not on a machine that is rigged to offer false security certificates), the proxy shouldn't be able to read your data.  But this isn't full proof.

Plus there's the aspect of maintaining protection from any man in the middle who might sniff your requests as they are being sent to the proxy.  This should be overcome if you have a secure connection to the proxy server itself.

Perhaps this will help:

http://ask-leo.com/can_an_anonymous_proxy_service_capture_my_email_password.html

 

However, there are limitations to this, as far as privacy goes.  The most obvious of which is, the proxy knows your IP and the requests you're making.  They also can see your traffic load.  So even if your data is encrypted, there's still quite a bit of info you're giving away.

Tor is essentially a network and protocol that overcomes this issue by routing traffic through at least three different servers before sending it on to the destination.  By having a separate layer of encryption for each of the three relays, there's virtually no way for any party on the Internet to connect you with your traffic...that is, there's essentially no way for anyone to know what you're doing...not even the servers (i.e. sites) you're visiting.  (There are caveats to this though, for example, if someone knows enough to be watching your traffic as well as the traffic of the site(s) you're visiting, it is feasible that through matching traffic volume and the timing of packets, a sniffer could potentially piece together your surfing.  This is why there are best practices to be regarded when using Tor, and things to be mindful of when attempting to work anonymously.)

Visit

https://www.torproject.org/ and get reading.  (This will step you through.)

 

  • | Post Points: 20
Top 500 Contributor
Male
Posts 183
Points 3,740

Yeah I have been reading about Tor software since Silva sent it to me. I totally forgot the word keylogging lol. I was thinking to myself "hmm I can't remember what it was called? recording type??" lol. JJ how do you know this stuff? Self taught?

  • | Post Points: 5
Top 10 Contributor
Male
Posts 6,885
Points 121,845
Clayton replied on Sat, Jan 5 2013 11:33 PM

 

@EL: What's wrong with Tor??

Google uses SSL if you have "https" in your browser bar, then you are accessing google through SSL, which means that it would be difficult for anyone besides Google to view your search queries.
 
Depending on the level of "untraceability" required, there are any number of measures you can take to varying degrees of exoticness. I suppose for CIA-level paranoia, you might purchase a laptop, configure Tor, go to a free WiFi hotspot somewhere a reasonable distance from your house where you will not be on security camera, set up SSL-over-Tor and then access a web proxy through SSL-over-Tor and then wipe the hard drive using a secure wiping utility and/or physically destroy the laptop when finished. You can reduce the specs on this down to your desired balance of economy versus security.
 
Clayton -
http://voluntaryistreader.wordpress.com
  • | Post Points: 50
Top 75 Contributor
Male
Posts 1,018
Points 17,760

physically destroy the laptop when finished.

only need to destroy the network card no?

Oh and the laptop that you use cannot have any previous uses which may be associated with your identity, AND make sure the laptop that you bought was either

1. stolen

2. bought with cash. credit/debit/checks are too unsecure and traceable.

then access a web proxy through SSL-over-Tor

isnt that redundant as tor is already just a bunch of proxies connected together?

“Since people are concerned that ‘X’ will not be provided, ‘X’ will naturally be provided by those who are concerned by its absence."
"The sweetest of minds can harbor the harshest of men.”

http://voluntaryistreader.wordpress.org

  • | Post Points: 20
Top 10 Contributor
Male
Posts 6,885
Points 121,845
Clayton replied on Sun, Jan 6 2013 12:30 AM

Don't use a stolen laptop... why use a laptop that someone is looking for??

I meant to use an "SSL web proxy" over Tor... Tor is not encrypted, it's just an onion-router. So, you need to either use a VPN or you need to connect to an SSL proxy through Tor, otherwise, you have information leakage even if only some of your packets are intercepted.

Clayton -

http://voluntaryistreader.wordpress.com
  • | Post Points: 5
Top 10 Contributor
Male
Posts 5,118
Points 87,310
ForumsAdministrator
Moderator
SystemAdministrator

Clayton:
I suppose for CIA-level paranoia,

Are anyone of us actually this paranoid? You'd figure that the CIA has bigger targets to go after than a bunch of guys who see the state for what is.

To paraphrase Marc Faber: We're all doomed, but that doesn't mean that we can't make money in the process.
Rabbi Lapin: "Let's make bricks!"
Stephan Kinsella: "Say you and I both want to make a German chocolate cake."

  • | Post Points: 20
Top 100 Contributor
Male
Posts 806
Points 12,855

 

DanielMuff:
You'd figure that the CIA has bigger targets to go after than a bunch of guys who see the state for what is.

You're right. They're probably more worried about the bunch of guys who see the state for what it is. wink

 

If I had a cake and ate it, it can be concluded that I do not have it anymore. HHH

  • | Post Points: 5
Top 10 Contributor
Posts 6,953
Points 118,135

Clayton:
purchase a laptop, configure Tor, go to a free WiFi hotspot somewhere a reasonable distance from your house where you will not be on security camera, set up SSL-over-Tor and then access a web proxy through SSL-over-Tor and then wipe the hard drive using a secure wiping utility and/or physically destroy the laptop when finished. You can reduce the specs on this down to your desired balance of economy versus security.

You'd think this sounds complex, but Clay is just describing what he does everytime he logs on to Mises.

 

  • | Post Points: 20
Top 10 Contributor
Male
Posts 6,885
Points 121,845
Clayton replied on Sun, Jan 6 2013 12:01 PM

Are anyone of us actually this paranoid? You'd figure that the CIA has bigger targets to go after than a bunch of guys who see the state for what is.

I mean, that's up to each person - the point is simply to illustrate the tradeoff between security and economy... the more you need to economize, the more security compromises you'll have to accept. A lot of people just install some Tor browsing client and then think "Ooh, I'm secure, the government can't track me." Idiot, your ISP has access to every single byte of data you're pulling down off the web (or pushing up).

@JJ: Actually, I have this specially-made pair of Internet-browser sunglasses that self destruct 5 seconds after I'm done using them...

Clayton -

http://voluntaryistreader.wordpress.com
  • | Post Points: 5
Top 500 Contributor
Posts 285
Points 4,140

https://tails.boum.org/

  • | Post Points: 5
Page 1 of 1 (17 items) | RSS