Although people who use Programs like Identity Cloaker obviously have a much higher level of privacy and security than anyone else, there are still certain limitations that the truly paranoid should be aware of. If for example you use a proxy or VPN from the confines of another network (perhaps corporate or academic) there are still logs created just like when using an ISP.
The logs are generally created to monitor access to the internet and would normally consist of client address (your computer or device) and the server address (the web site or resource you are visiting). In addition there would normally be more specific information regarding specific files, web pages or resources accessed. If you use a proxy or VPN server however this changes slightly as we can read below.
Instead of listing all the web sites and the addresses of those servers, when you are using a proxy or VPN the only remote address that will be listed is that of the proxy itself. No other information will be available if using a VPN (a necessity for encryption) just the single address. This in itself causes a little problem in that if the logs files are analysed it is possible to deduce that the connection consists of a proxy or VPN server simply because of the existence of a single address.
IN order to mitigate this, then this address should be rotated so that the connection simulates a normal web connection. The following video demonstrates how to achieve this with an IP Rotator.
When this function is enabled in Identity Cloaker, the address of the remote connection would change periodically simulating the function of a normal web browser and making the use of a VPN much less visible. Remember though although people with the right skills carefully analysing the logs could determine that a VPN might be being used, they would be unable to determine any more information than that especially is an IP address rotator program or script is being used.
Leave a comment