-
proxies - invisible?
I've used proxies for some time and find them great to minimize spam, etc. but the question remains, can one be traced if they use a proxy? I'm familiar with ISP logs but in general if an end-site wants to know who looked at such and such, can they ***** it back to a specific machine? And does multiple (stacked) proxies make it harder? Just curious, no secret agent fantasies here :) Thanks for the help!
-
<iframe align="right" marginwidth="0" marginheight="0" width="*20" height="240" scrolling="no" frameborder="0" src="http://rcm.amazon.com/e/cm?o=*&l=as*&f=ifr&t=allnettools-20&p=8&asins=074*4**46*&IS2=*&lt*=_blank"><MAP NAME="boxmap-p8"><AREA SHAPE="RECT" COORDS="*4, 200, *0*, 207" HREF="http://rcm.amazon.com/e/cm/privacy-policy.html?o=*" ><AREA COORDS="0,0,*0000,*0000" HREF="http://www.amazon.com/exec/obidos/redirect-home/allnettools-20" ></map><img src="http://rcm-images.amazon.com/images/G/0*/rcm/*20x240.gif" width="*20" height="240" border="0" usemap="#boxmap-p8" alt="Shop at Amazon.com"></iframe>
Yes, from properly logged (at the proxy) connection it is possible to trace the origination point. Of course, multiple hops and all the other "covering your *****s" tricks work, but so do the forensic teams - it's always a race.
Secret agent realities, exactly :)
I recommend that you read a book by Cliff Stoll - The Cuckoo's Egg - while it's not about http proxies, but it is about this race, very well-written, and as relevant today as ever. It's a classic. I've linked it for your convenience.