21 | | One method is using a proxy server which works by acting as a mediator between you and the service you are communicating with. Proxies are used to hide web traffic from the service the user is attempting to connect to. All the data you send and all the data you receive go through it. By connection through a proxy the user is able to camouflage his actual identity so that the service only sees the address of the proxy. The drawback to this is that the proxy is able to see both the user and the service, so it knows the identity of both parties. This is the easiest method of anonymity but it is also the weakest. |
| 21 | One method of hiding your identity would be using a proxy server which works by acting as a mediator between you and the service you are communicating with. Proxies are used to hide web traffic from the service the user is attempting to connect to. All the data you send and all the data you receive goes through it. By connection through a proxy the user is able to camouflage his actual identity so that the service only sees the address of the proxy. |
| 22 | The benefits of using a proxy are |
| 23 | * Setting up proxies does not take long |
| 24 | * They do hide your traffic |
| 25 | |
| 26 | But there are a few drawbacks to this |
| 27 | * One is that it is not hard to determine that the traffic is coming through a proxy. |
| 28 | * Another is that the proxy is able to see both the user and the service, so it knows the identity of both parties. |