Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

Rubydoppler

macrumors 6502a
Original poster
Jan 25, 2010
942
0
USA
I don't understand. Say you torrent or do whatever your ISP won't like so you use a proxy service like Tor.

Isn't the connection still (with Proxy)
You --> ISP --> Proxy Server
Then backwards??


Instead of normally
You --> ISP....

Can't the ISP still see what you are doing since it has to go through it on both ends to get to and from you? What am I missing here. How does a proxy make you anonymous. Thanks.

Related I guess because I started using Tor.. but I don't get how I am safer.
 

8CoreWhore

macrumors 68030
Jan 17, 2008
2,653
1,191
Tejas
Not all ISP's care... but, it's the bandwidth they care about, not what you're doing with that bandwidth - unless the receive a complaint for copyright infringement.

So, with Tor, the bandwidth is the same, even if they don't know where the traffic is coming and going.

But Tor basically hides where you visit on the web. If you don't want copyrighters to know it's you, Tor helps.

If you don't want the Govt. to know what political sites you visit, etc... Tor helps.
 

mrapplegate

macrumors 68030
Feb 26, 2011
2,818
8
Cincinnati, OH
I don't understand. Say you torrent or do whatever your ISP won't like so you use a proxy service like Tor.

Isn't the connection still (with Proxy)
You --> ISP --> Proxy Server
Then backwards??


Instead of normally
You --> ISP....

Can't the ISP still see what you are doing since it has to go through it on both ends to get to and from you? What am I missing here. How does a proxy make you anonymous. Thanks.

Related I guess because I started using Tor.. but I don't get how I am safer.

Did you read the well written Overview?
Connect to the tor network then check your IP, you will see it is no longer your ISP's , but an anonymous IP.
 

baryon

macrumors 68040
Oct 3, 2009
3,878
2,929
Connecting to a proxy is like connecting to any computer. However, the proxy is connecting to another computer that has the illegal files. So you're not directly connecting to the illegal files.

Another use of a proxy is when a site gets blocked. Say you have a porn site that is blocked on a school's network, so you can't visit it. However, students could bypass that by connecting to a proxy (which isn't blocked, as it's just a server like any other), and then asking the proxy to connect to the porn site, and relay the information. You're receiving the same information, but you're not connecting directly to the blacklisted server, bypassing the blacklist system.
 

mrapplegate

macrumors 68030
Feb 26, 2011
2,818
8
Cincinnati, OH
Connecting to a proxy is like connecting to any computer. However, the proxy is connecting to another computer that has the illegal files. So you're not directly connecting to the illegal files.

Another use of a proxy is when a site gets blocked. Say you have a porn site that is blocked on a school's network, so you can't visit it. However, students could bypass that by connecting to a proxy (which isn't blocked, as it's just a server like any other), and then asking the proxy to connect to the porn site, and relay the information. You're receiving the same information, but you're not connecting directly to the blacklisted server, bypassing the blacklist system.

A proxy server will reveal your org IP address in the headers, Tor hides your org IP. A proxy server offers no online anonymity.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.