The Patriot Act and similar amendments passed in nations throughout the world improved the demand for solutions, which redirect your traffic by way of a proxy machine & encrypt it to prevent other net users and even your ISP from spying on you.All for example your ISP is able to see is that you recognized an secured connection to a host, nothing more.
Employing a proxy server isn't absolutely protected, though. To talk together with your ideal server providing the website you intend to visit, the proxy needs to decrypt your traffic and thus the web company of the proxy host has the capacity to begin to see the unencrypted knowledge stream. This can be prevented by chaining proxies together or by simply utilizing a support like Tor which redirects your traffic through 3 proxies, so named "nodes" ;.In this manner, it is almost impossible to identify you, but...
the 'major but' here's, that the exit node decrypts your traffic again to communicate with the host you want to reach, e.g. Google.com. This implies, that the exit node can certainly spy on the contents of the deals you send through the tor system, like as an extratorrent unencrypted accounts and generally everything else that will be perhaps not SSL encrypted. That can be used against you in lots of ways:
Positively everybody else might give a Tor node. The us government, criminals, ... Although the quit node suppliers don't know who is giving & seeking the traffic being redirected through their node, they are able to utilize the knowledge they are able to "phish" in this way against you anyway. More over it is quite easy to determine who you are simply by interpreting the recorded packages .
An option to Tor and similar solutions are VPN services. Same problem applies here: The VPN company can quickly see your unencrypted traffic & use it against you. It happened at least once that legislation enforcment penetrated this kind of service and produced a complete organisation of web thieves down.
The conclusion consequently is, that such methods to stay anonymous may be efficient but you are generally forced to confidence the provider of the proxy/VPN service you want to use. In reality, this can't be achived. You may not know who is behind a service and even when this individual could be respected, he or she will definitely perhaps not be allowed to share with you that the service is treated by the government, not forgetting the danger of such solutions being hacked.