Thursday, December 25, 2008

Are Anonymous Proxy Lists the Key to Anonymous Web Browsing?

Well they sure sound like it don't they - pick a server from the anonymous proxy list and direct all your surfing through it. It does give the impression of security but I'm afraid it doesn't quite tell the whole picture and in fact if you're unlucky using this method may effectively give away your identity online.

The key to understanding the role of the anonymous proxy is really understanding what a proxy actually does. You've almost certainly used one at work or school if you have access to the internet. Very basically all your web requests are sent to this server and then directed out at the target site, the proxy server then forwards all the received information to your browser. The advantage is that your work or school can control what goes in and out of their network and has a list of every web page surfed.

When you use one of the free anonymous proxies from these lists that is what you are doing, sending all your information via this one server to forward all requests. The advantage and the reason people use them is that your own IP address is not logged on the server you visit (it logs the proxies address instead)

The disadvantage is that you basically hand all your web traffic to the owner of one server to control, the system administrator of the proxy server can access ALL your web traffic if they wish, as well as log all your activity as well. One of the other disadvantages is that you will almost certainly slow down your browsing substantially, these proxies almost inevitably get overused and it adds another hop to your browsing.

The other significant problem is that these anonymous proxy servers are usually hacked or misconfigured servers, they are often full of spyware and the real owners often have no idea t hey are being used as a proxy! If you use an anonymous proxy make sure you know who runs and administrates this server and that you are not using one owned by a European Hacking Crew!

To be anonymous on the internet you need to do much more than use an anonymous proxy server in any case. All your web traffic and your IP address are accessible across the wire and everything is logged at your ISP (for two years in Europe). HTML traffic is mostly sent in clear text, it's perfectly readable as you'll see if you ever start a sniffer at a wireless cafe or hotel.

I use a solution which combines a network of secure and private proxies (so I can change my location when I need) that is I can appear as a US surfer one minute, then use a German proxy a few minutes later. It also encrypts my connection completely using a military grade cipher called AES so nobody not even my ISP can view my connection. Obviously I have to pay a small charge for this but I would rather stay secure and anonymous and my browsing speed is not affected.

If you want to read about some of my thoughts on using anonymous proxies and how you can surf without being spied on, try the link below.

Anonymous Surfing Proxies

Jim

Tuesday, December 16, 2008

Email Spam Scams and Variations of 419 Scams

With the horrific stories of successful scammers making millions from fraudulent activities online, efforts are now in full force to crack down the 419 scammers. An ABC documentary on the subject traced a scam to its origins in Nigeria.

The ABC documentary was just one of many efforts, now getting more concerted, to crack down on the fraudsters perpetuating this activity on a massive scale. The Nigerian police has created the Economic and Financial Crimes Commission (EFCC), a special division specifically to enforce the section of the Nigerian Criminal Code, 419. The code makes it illegal to obtain money by false pretenses. It was not enforced until recently.

The scams happen worldwide. The old, traditional post mail scams have now escalated to million-dollar, worldwide fraud business because of the availability and accessibility of internet facilities. What authorities find out though, is that a lot of these scammers are not part of an organization. While there may be highly organized master scammers, many are small scale schemes looking to make an easy buck.

A lot of the scams have been traced back to parts of Western Africa. Nigeria is a hot spot. The decline in Nigeria's oil-drive economy has left millions desperately poor. But instead of looking for decent jobs, thousands of computer-savvy Nigerians are making a living off of thousands of gullible people from the West, many of whom are Americans.

Spam emails are the most widely used method of fraud. Spammers send varied types of fraudulent emails. It begins with the use of email extraction programs that scour internet websites for email addresses. In some instances, fraudsters obtain a list of email addresses from the black market.

The scammer would usually pose as a widow or heir of a corrupt government official who has left his family with embezzled money stashed away in some hidden account. The widow would ask help to get their money on the funds and in exchange, promise millions of dollars in reward money.

Sometimes, a scammer will pose as a diplomat or a corrupt government official looking to make for a partner-investor in a business. The proposal is usually to ask help to funnel dirty money and "cleanse" it. The money is supposedly stashed somewhere inaccessible. If one helps release the funds that would require advancing a small sum of money, the victim will supposedly receive a million-dollar reward and business deal.

Scammers will sometimes notify a victim of winning a lottery online. The amounts would be anywhere from hundreds of thousands to millions of dollars purportedly held in trust somewhere pending your accomplishment of some paper work. Typically, the victim will be asked to pay a small sum to cover facilitation and processing fees before the money could be released.

Some scammers will identify themselves as a bank officer knowing of a deceased depositor who has died without a next of kin. He would ask the victim to help them get the funds before others do by posing as next of kin and filing a claim. The victim will then be promised a commission, a reward for the help.

More recent forms now involve romance angles and a lot of them now operate in dating sites and online communities. They pose as desperate women wanting to fall in love and scam lonely, gullible men for cash.

For more information on Anti-Spam Forum and Charitable Fraud and Religious Scams please visit our website.