[ 3 / biz / cgl / ck / diy / fa / ic / jp / lit / sci / vr / vt ] [ index / top / reports ] [ become a patron ] [ status ]
2023-11: Warosu is now out of extended maintenance.

/sci/ - Science & Math


View post   

File: 325 KB, 300x300, screenwarp.gif [View same] [iqdb] [saucenao] [google]
3423960 No.3423960 [Reply] [Original]

My DIY research is getting conflicting reports from varying sources.

One source insists that an rDNS trace will tell you every computer between you and the client that accessed you, as far back as the ISP, and that internet anonymity relies primarily on jurisdictional barriers to search warrants against the ISP.

Another source claims that a proxy is effectively an untouchable source of anonymity. That rDNS will only provide the proxy's IP, and that it is otherwise impossible to trace which proxy user accessed your system.

What is truth? What is lies?

>> No.3424174
File: 124 KB, 500x500, pentaswirl.gif [View same] [iqdb] [saucenao] [google]
3424174

bump

>> No.3424188
File: 45 KB, 500x500, wtf_mesh.jpg [View same] [iqdb] [saucenao] [google]
3424188

i see where this is headed finally

>> No.3424195
File: 17 KB, 531x530, circles_wtf.gif [View same] [iqdb] [saucenao] [google]
3424195

>> No.3424232

The bottom line is you truly are traceable no matter what you hide behind rDNS trace is effective in finding people behind proxies but the crossing between servers usually require permission from a server owner or a warrant to access information transfer in between servers. All proxies are different some proxies mask you IP and don't keep a record of incoming travel, some proxies mask IP and record your IP, some proxies simply use there server for you to travel on but really don't mask your IP. There are several systems of trying to remain anonymous all of which have there strengths and weaknesses. I have a link which I need to find which should provide you all the information your looking for on web anonymity but its a secure tor page so your going to have to give me some time to find it.

>> No.3424234

>>3423960
why the fuck is it moving like that?
>>3424188
why the fuck is it moving like that?

>> No.3424244
File: 166 KB, 554x708, 1984_i_love_you.jpg [View same] [iqdb] [saucenao] [google]
3424244

>>3424234

because i love u

>> No.3424252
File: 1.01 MB, 270x161, asians_are_rational.gif [View same] [iqdb] [saucenao] [google]
3424252

sry --gonna head out & eat some ice cream now, at least we got a little more of the discussion bumped =(....

>> No.3424261

>>3423960
Here's the rDNS concept very well explained:
>http://www.youtube.com/watch?v=SXmv8quf_xM

>> No.3424269

>>3423960
If someone is using a proxy that isn't very broken, you can trace him up to the proxy and no further. The proxy's owner can trace the next part of the route, IF he's willing; this is where jurisdictional issues play a role,
since commanding a proxy owner to cooperate is much easier if he lives in the same country as you.

>> No.3424305

>>3424232
BTW OP Tor is having some problems locating the page but here is the URL if you wish to access it. http://g7pz322wcy6jnn4r.onion/opensource/polyfront/internetoverlayanalysis.html

>> No.3424346

>>3424305
sorry, but that looks sketchy as hell

So, if I understand correctly, securing guaranteed anonymity is as easy as finding a proxy that deletes it's own log files regarding IP traffic?

Not that I have the slightest intention of doing so, but to further my understanding- would it technically be possible to trace an IP further simply by hacking the proxy and obtaining any logs it may keep?

>> No.3424372

>>3424346
>would it technically be possible to trace an IP further simply by hacking the proxy and obtaining any logs it may keep?
Yes, it certainly would, and not just "technically" either. You get the logs, you have everything you need - which is why the police subpoena logs all the time.

>> No.3424380
File: 473 KB, 500x500, subterrain.gif [View same] [iqdb] [saucenao] [google]
3424380

>>3424372
But if it deletes or does not keep those logs, then all is lost?

>> No.3424382
File: 16 KB, 350x253, 4927364888_george_costanza_xlarge[1]..jpg [View same] [iqdb] [saucenao] [google]
3424382

> 2011
> Using proxies to interact online anonymously.

>> No.3424393

>>3424346
Yes and No you can never really be sure with proxies sometimes they say they do its all up to the operator of the proxy. Proxies are the sketchy and should be mixed with some other method of cloaking such as Tor, I2P,Tunneling,OPP, VPN servers,A4proxy, etc

>> No.3424402

>>3424380
Yup.

>> No.3424417

>>3424393
You're an idiot if you use any of these things.

>> No.3424440
File: 161 KB, 500x500, tunnelswirl.gif [View same] [iqdb] [saucenao] [google]
3424440

>>3424393
Thanks anon, that concludes my research at this time.