An anonymizer removes all the identifying
information from a user’s computers while the user surfs the Internet,
thereby ensuring the privacy of the user.
Many anonymizer sites create an anonymized URL by
appending the name of the site the user wishes to access to their own
URL, e.g.:
http://anon.free.anonymizer.com/http://www.yahoo.com/
After the user anonymizes a web access with an
anonymizer prefix, every subsequent link selected is also automatically
accessed anonymously. Most anonymizers can anonymize at least the web
(http:), file transfer protocol (ftp:), and gopher (gopher:) Internet
services.
However, anonymizers have the following limitations:
-
HTTPS. Secure protocols like “https:” cannot be
properly anonymized, since the browser needs to access the site
directly to properly maintain the secure encryption.
-
Plugins. If an accessed site invokes a third-party
plugin, then there is no guarantee that they will not establish
independent direct connections from the user computer to a remote site.
-
Logs. All anonymizer sites claim that they don’t
keep a log of requests. Some sites, such as the Anonymizer, keep a log
of the addresses accessed, but don’t keep a log of the connection
between accessed addresses and users logged in.
-
Java. Any Java application that is accessed through an anonymizer will not be able to bypass the Java security wall.
-
Active X. Active-X applications have almost unlimited access to the user’s computer system.
-
JavaScript. The JavaScript scripting language is disabled with url-based anonymizers
Some anonymizer sites are:
No comments:
Post a Comment