Intellectual Property and the Internet/Anonymizers

An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information by hiding the client computer's identifying information.[1]



There are many purposes for using anonymizers. Anonymizers help minimize risk. They can be used to prevent identity theft, or to protect search histories from public disclosure.

However, anonymizers can also be used by individuals wishing to avoid the consequences of engaging in criminal, disruptive, or socially unacceptable behaviour online. For example much of the child pornography distributed through the internet is accessed through anonymizers. Also, they are used to bypass web technologies that limit online content access to a certain number of minutes or quantity of data.

Some countries, especially dictatorships or Islamic countries, fail to serve the rights of minority groups, or oppress any opposition to their government. These countries apply heavy censorship on the internet, sometimes with the death penalty.[2] Anonymizers can help in allowing free access to all of the internet content, but cannot help against persecution for accessing the Anonymizer website itself. Furthermore, as information itself about Anonymizer websites are banned in these countries,[3] users are wary that they may be falling into a government set trap.[4]

Libertarian and other movements concerned with the growing Orwellian grip of governments in free societies advocate using Anonymizer services in order to avoid government or other organized tracking.[5]

Anonymizers are also used by people who wish to receive objective information with the growing Target marketing on the internet and targeted information. For example, large news outlets such as CNN target the viewers according to region and give different information to different populations. Websites such as YouTube obtain information about the last videos viewed on a computer, and propose "recommended" video's accordingly, and most of the online targeted marketing is done by showing advertisements according to that region. Anonymizers are used for avoiding this kind of targeting and getting a more objective view of information.[6]

Use of anonymizers


Protocol specific anonymizers


Sometimes anonymizers are implemented to work only with one particular protocol. The advantage is that no extra software is needed. The operation occurs in this manner: A connection is made by the user to the anonymizer. Commands to the anonymizer are included inside a typical message. The anonymizer then makes a connection to the resource specified by the in-bound command and relays the message with the command stripped out.

An example of a protocol specific anonymizer is an anonymous remailer for e-mail. Also of note are web proxies, and bouncers for FTP and IRC.

Protocol independent anonymizers


Protocol independence can be achieved by creating a tunnel to an anonymizer. The technology to do so varies. Protocols used by anonymizer services may include SOCKS, PPTP, or OpenVPN.

In this case either the desired application must support the tunneling protocol, or a piece of software must be installed to force all connections through the tunnel. Web browsers, FTP and IRC clients often support SOCKS for example, unlike telnet.

Use of multiple relays


One example of "daisy-chained" anonymizing proxies is the "Tor network". Tor does not encrypt your traffic[7] from end to end, rather it builds up a series of encrypted connections through the relays in the Tor network. An additional layer of encryption should be used with Tor if end-to-end encryption is required. See risks of using anonymous proxy servers.

Another example is I2P - the Anonymous Network. It works similarly to Tor, yet with some crucial differences: I2P is an internal network. It is totally decentralized and does not rely on central lists servers and unlike Tor it uses no bidirectional tunnels, which makes timing attacks far more difficult, and it is end-to-end encrypted. As you never know if a given mix logs all connections or not, the only way to be really sure there is no logging is to run your own anonymizing mix node and blend your traffic with those of other users, who in turn need not trust you, as they blend their traffic with yours and other users' traffic in their own mix nodes. This is the philosophy behind i2p - each nodes routes traffic for others and blends its own traffic in, whereas one's own traffic will be relayed by other peers through so-called tunnels made-up of various other peers. The network is highly dynamic and totally decentralized. It also takes care of other nodes learning about your node existing, for without peers using your node, there would be no traffic to blend yours with. As all traffic always stay within the i2p network, a routing user's i2p will never show on public websites' logs.

Another example of multiple relays is sending an e-mail to an anonymizing remailer, which relays it to another remailer, which eventually relays it to its destination.


  1. "How Anonymizers Work". The Living Internet. Retrieved 2007-08-03.
  2. "List of the 13 Internet enemies". Reporters Without Borders. Archived from the original on November 8, 2006. Retrieved January 9, 2008.
  3. Anonymizer to provide censor-free internet to China ( website)
  4. US FBI uses 'Anonymizer trap' to catch online pedofiles (Security Focus website)
  5. "How to use Bitcoin, the most imnportant creation in history" - Article on the Libertarian News website
  6. About targeted advertising on an anonymizer (FastCompany Anonymizer website) - an article describing the typical targeted advertising avoidance by most anonymizer services, while this one enables continued online targeted marketing
  7. The hack of the year