In using a proxy server (for example, anonymizing HTTP proxy), all data sent to the service being used (for example, HTTP server in a website) must pass through the proxy server before being sent to the service, mostly in unencrypted form. It is therefore possible, and has been demonstrated for a malicious proxy server to record everything sent to the proxy: including unencrypted logins and passwords.
By chaining proxies which do not reveal data about the original requester, it is possible to obfuscate activities from the eyes of the user's destination. However, more traces will be left on the intermediate hops, which could be used or offered up to trace the user's activities. If the policies and administrators of these other proxies are unknown, the user may fall victim to a false sense of security just because those details are out of sight and mind .
A proxy server that removes identifying information from the client's requests for the purpose of anonymity is called an anonymizing proxy server or anonymizer.
Many web proxies attempt to block offensive web content. Other web proxies reformat web pages for a specific purpose or audience . Network operators can also deploy proxies to intercept computer viruses and other hostile content served from remote web pages.
No comments:
Post a Comment