Menu
Forums
All threads
Latest threads
New posts
Trending threads
New posts
Search forums
Trending
What's new
New posts
New profile posts
Latest activity
Members
Current visitors
New profile posts
Search profile posts
Upgrades
Log in
Register
What's new
Search
Search
Search titles only
By:
All threads
Latest threads
New posts
Trending threads
New posts
Search forums
Menu
Log in
Register
Navigation
Install the app
Install
More options
Contact us
Close Menu
Forums
Server Development
Habbo Retros
Habbo Tutorials
How to get a proxy for $0.01
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Core" data-source="post: 395287" data-attributes="member: 72270"><p>Your research is completely wrong, tor doesn't use proxies it splits the data which you sends across countless routers, with no meta data of the original location. So in return the exit node has no idea of the original senders data. Tor simply relies on multiple layers of encryption - whereas with a proxy the client will communicate directly to the given server.</p><p></p><p>In this case, it's the DDoS Protected server which will filter the request before sending it on to the server. In return only sending clean traffic to the users server as the proxy servers firewall would of disposed of most of the malicious traffic.</p><p></p><p>As for the FBI obtaining access to servers behind a proxy server, it's not hard... Obtain a warrant to a ground, look at server logs and see what outgoing traffic from client -> proxy -> server is happening. Or simply hack the server if it's on a remote network... What do you think they do in the likes of the NSA? Mostly security analysis...</p><p></p><p>As for a ping, it's only going to show you the IP address of the server (in the case of a reverse proxy, which is what this is...).</p></blockquote><p></p>
[QUOTE="Core, post: 395287, member: 72270"] Your research is completely wrong, tor doesn't use proxies it splits the data which you sends across countless routers, with no meta data of the original location. So in return the exit node has no idea of the original senders data. Tor simply relies on multiple layers of encryption - whereas with a proxy the client will communicate directly to the given server. In this case, it's the DDoS Protected server which will filter the request before sending it on to the server. In return only sending clean traffic to the users server as the proxy servers firewall would of disposed of most of the malicious traffic. As for the FBI obtaining access to servers behind a proxy server, it's not hard... Obtain a warrant to a ground, look at server logs and see what outgoing traffic from client -> proxy -> server is happening. Or simply hack the server if it's on a remote network... What do you think they do in the likes of the NSA? Mostly security analysis... As for a ping, it's only going to show you the IP address of the server (in the case of a reverse proxy, which is what this is...). [/QUOTE]
Insert quotes…
Verification
Post reply
Forums
Server Development
Habbo Retros
Habbo Tutorials
How to get a proxy for $0.01
Top