11 per cent of respondents would use "incognito" mode to protect a payment, four per cent would resort to an anonymizer
, and seven per cent of those surveyed would repeatedly enter and wipe the data "to confuse viruses".
For hiding your traces on the Internet, it is therefore not sufficient to use an anonymizer
service like JonDonym or Tor alone.
Whatever the next insanely great thing to replace TPB-as-it-once-was might be, the people behind it appear to be upping the game; along with their, almost ready, IPREDator anonymizer
Webroot have announced the release of a new version of Webroot[R] Web Security SaaS, including significant enhancements to deliver innovative, proactive anti-phishing detection; policy enforcement despite the use of anonymizer
or proxy bypass sites; and more robust reporting capabilities.
If two systems had the same amount of page requests from censored users, a peer-to-peer system like Peekabooty would require less explicit operation funding than a system like Anonymizer
, which uses central servers with company-funded bandwidth.
This allows network administrators to immediately identify new proxy anonymizer
sites when they are created, rather than days or weeks later when they are added to the URL list, ultimately eliminating the burden placed on overextended IT departments.
Also available are a variety of pay programs (many with free trials) such as Nullsoft Winamp (a media player), Anonymizer
for anonymous Web surfing, and antispyware programs.
Customers include ACD Systems, Anonymizer
, Astaro, DivXNetworks, InterVideo, Konica/Minolta, Open-Xchange, Opera, Punch
Indeed, dissident groups have found a technological solution to their communications problems: Anonymizer
But the software is "just routing the connection through an anonymizer
to accomplish that, and then you have the same problem," says Robert Dinse, president of Eskimo North (www.
provides services which allow the anonymous use of Internet resources such as email, usenet, and the web.
The member logs on via a web anonymizer
and using credentials which have been securely delivered to the member but are not attributable to the member.