home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.privacy      Discussing privacy, laws, tinfoil hats      112,125 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 111,605 of 112,125   
   Marion to R.Wieser   
   Re: It's not easy finding a free no-regi   
   14 Sep 25 10:09:15   
   
   XPost: alt.comp.freeware   
   From: marionf@fact.com   
      
   R.Wieser wrote:   
   >> That is, instead of connecting directly to a site, your request   
   >> goes through the proxy   
   >   
   > Yep.  But what was/is its intended purpose ?   
      
   A proxy like Psiphon reroutes traffic. Instead of going directly to a site,   
   your request goes thru Psiphon, which masks your IP & may encrypt some   
   data. It's useful for bypassing blocks, switching IPs fast or adding light   
   obfuscation, where you get speed and IP obfuscation as the benefit.   
      
   An "intended purpose" can vary, of course, depending on the privacy need.   
   1. Circumvent censorship   
   2. Hide IP   
   3. Add weak encryption   
   4. Chain with VPNs for layered privacy   
      
   My setup, for example, chains three levels (two of which are optional).   
   1. VPN (full tunnel)   
   2. Psiphon (proxy tunnel)   
   3. VPN browser (app-level tunnel)   
      
   Each adds a layer. You can use 1, 2 or all 3. More layers = more   
   obfuscation, but slower speed. Psiphon alone is fast & light.   
      
   It's good for quick IP switch or bypassing filters.   
      
   >> which forwards it on your behalf for the purpose of   
   >> a. Hiding your IP address   
   >   
   > Your psiphon3 proxy is installed on your 'puter, and so it still uses your   
   > 'puters IP.  No IP hiding possible.   
      
   True, Psiphon runs locally but tunnels traffic thru remote servers.   
   While Psiphon sees my IP address (if I run it first, that is), the   
   destination sees Psiphon's exit node's IP, not mine. That's IP masking.   
      
   > Though that /side effect/ can be had (not a proxies purpose, so it could   
   > still 'leak' your IP).   
      
   Psiphon is definitely not perfect. Especially on Windows which is miserable   
   to set the proxy (remember, there are three different ways and each app   
   chooses one or none of those three different ways - so it is miserable).   
      
   You're right that a misconfig or leaks can expose your IP, which is why I   
   wrote the script to check and set the three different ways after all. :)   
      
   Used correctly, Psiphon hides your IP from visited sites, and if you put a   
   VPN before or after Psiphon (or both), then each is hidden from the other.   
      
   >> b. Bypassing censorship   
   >   
   > I guess it could do that.  A bit of a poor-mans and rather limited VPN I   
   > guess.   
      
   There's a trick that I don't fully understand so I hope others can flesh it   
   out, but Psiphon and VPN "look different" to the ISP & to the web site.   
      
   Psiphon is designed to bypass censorship by tunneling traffic thru proxy &   
   VPN-like methods. It uses a mix of SSH, HTTP & VPN protocols to evade   
   blocks. While not a full VPN, it routes traffic thru remote servers,   
   allowing access to restricted content.   
      
   It's not "limited" in purpose. It's optimized for reachability, not   
   encryption. To do that, Psiphon uses obfuscated protocols (SSH, HTTP, VPN)   
   to bypass blocks. It often mimics regular web traffic to avoid detection.   
   VPNs use standard tunneling protocols (OpenVPN, WireGuard, IPsec) that are   
   easier to fingerprint.   
      
   TO the ISP, for example VPN (encrypted tunnel, known ports, predictable   
   handshake) looks different than Psiphon (which may look like HTTPS or SSH,   
   which could be harder to block due to it not looking suspicious).   
      
   To the destination website, the VPN IP exit server is often a known   
   datacenter, whereas Psiphon's exit node is intended to rotate or mimic   
   residential exit nodes (as far as I can ascertain, anyway).   
      
   While it may or may not work, the point is that Psiphon may evade DPI or   
   filtering better. VPN offers stronger encryption but is easier to detect.   
      
   >> c. Adding an additional layer of anonymity (e.g., to a VPN setup)   
   >   
   > If your proxy hides your IP, than the VPN just re-hides it.  What good does   
   > that do ?   Also, a repeat of your first point.   
      
   To answer your question, let's go slowly here as the order matters (VPN   
   first Psiphon second versus Psphon first VPN second) and the fact that not   
   every app respects proxy mattes too, as does the fact that proxies are   
   faster than VPN as does the fact that proxies look different to snoopers   
   than VPN, etc.,   
      
   See? I told you it's complicated.   
      
   That's why I'm asking for someone on this newsgroup who knows more than I   
   do because I only touched proxies 25 years ago and again, only a week ago.   
      
   So far you're the only one on this newsgroup who even seems to understand   
   it, where I was hoping someone would tell ME how this darn thing works.   
      
   Each layer masks different metadata. Stacking them splits trust.   
      
   For example, let's say I run system-wide VPN first & then Psiphon second.   
   1. The VPN server sees my real IP address & encrypts my traffic.   
   2. The Psiphon server sees only the VPN IP & forwards the traffic.   
   3. The final destination sees the Psiphon server   
      (which looks like a residential IP address).   
      
   The result is no single party sees the full picture. ISP sees VPN. VPN sees   
   Psiphon. Psiphon sees destination. Destination sees Psiphon exit IP.   
      
   It's not redundant. It's compartmentalization.   
      
   > The question still is why you think those two DLLs you named are proxies   
   > (I'm dropping the last one, as thats just a description of an intended   
   > functioning, not something you can have running on your 'puter)   
      
   Let's be clear that I never once mentioned DLLs. I didn't say WinINET or   
   WinHTTP *are* proxies. I said they support proxy behavior. Windows apps use   
   those APIs to apply proxy settings, including PAC/AutoDetect. PAC isn't a   
   DLL, it's a config script. AutoDetect uses WPAD or DHCP to find proxy   
   settings.   
      
   My question was about how Windows handles proxy routing, not about DLL   
   internals.   
      
   I only started using proxies a week ago so I'm hoping something (anyone!)   
   on this newsgroup knows them better than I do as they're not intuitive.   
      
   Why do 3 completely different proxy mechanisms exist in Windows anyway?   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca