Anonymous in the Internet?

This guest article by Frank Richter ( German) deals with questions such as “Is it possible to navigate the Internet anonymously?” and “What anonymization methods can be used to leave fewer traces without endangering my own security?”.

Technical basics:

When Internet pages are called up, particular technical processes occur that provide larger or smaller amounts of data. These are briefly described below.

Creating the connection:

When an address is entered into a browser, a connection is created between your computer and a DNS server, which converts the address into an IP address. This IP address is sent back to the browser, which then calls up this address. This process is called “name resolution”. If the specified address of the web server actually exists, then a connection to this web server is then created. When doing this, the web server is informed of your IP address, since the web server needs to know where it is to send the response.

Page creation:

After a connection is created using the so-called 3-way handshake, the web server then sends the page you requested. However, further data is sent before this occurs:

  • Browser used
  • Language set
  • Time zone
  • Operating system

If you did not manually enter the address into the browser but clicked on a link, then the web server also receives information on the page from which you came (Referrer). However, these are not the only methods of acquiring data.


If Cookies are accepted and stored by your Browser then the page operator can read more information:

  • Unique identification number
  • Last visit
  • Navigation patterns
  • Products/Pages you have looked at

If the site requires a login, then the user name and password are sometimes stored here (sometimes even in PLAIN TEXT).


If you allow scripts to run (e.g. ActiveX, Java etc.) then the possibilities are almost unlimited! Everything can now be read out and discovered. Programs and damaging routines can also be executed. The limits here are defined by the possibilities of the scripting language and the access rights under which you have started the Browser (using administrative rights or limited user rights).


As you can see from the abovementioned basics, anonymization requires important prerequisites to be carried out by the user!

If you allow Cookies or Scripts then anonymity is not longer possible, since the page operators can use both of these techniques to read out important individual information and can thus bypass any anonymization service you may be using!

For example, an embedded Script in a web page can be used to find your true IP address.

Cookies can be used to assign unique identification numbers to a user and recognize them when they return to the website.


The various anonymization techniques are implemented at different communication points. Some of these simply hide your true IP address. Others swap Referrer or Cookie information to make them no longer usable.

Other techniques rely on complete encryption of all communication and even direct end-to-end connections.


Whatever technique you use, they all have a decisive disadvantage! You must always rely on a third party! I.e. you are dependent on the trust / trustworthiness of this third party!

For this reason, anonymization programs should not be used for any type of Internet business! For example:

  • Bank business (online banking)
  • Purchasing (online shopping)

In the case of other services requiring a login, e.g. email retrieval, forum logins, etc., the use of anonymization programs should be very carefully considered!!

Anonymization techniques:

There are a number of different anonymization techniques available. These are described below:

  • Single page access via a web service
  • Proxy solutions
  • Cascaded proxy solutions
  • Anonymization and encryption (VPN, HTTPS)

Anonymization of single pages:

Anonymization of single Internet pages is the simplest way of attempting to hide your true origins. This is done using a simple website that has at least one data entry field where you can enter the address of the desired web page. The service then requests the page on your behalf.

Please note that only the first page is anonymized, if at all. As soon as you navigate within this page, the page is then requested directly by your browser and not via the anonymization service.


Some of the web anonymization services offer additional functions, but only when scripting is allowed:

  • Control over “Referrer”
  • Control over images
  • Control over the execution of scripts by the requested page (not the anonymizer page)
  • Control of Cookies
  • Control over the transferred “User Agent”

Proxy solutions:

There are various different proxy solutions offering different advantages and disadvantages:

  • Proxy solution as a Browser Plugin
  • Proxy solution as an independent program

Both solutions use Proxy lists that are more or less regularly updated. Many solutions of this type are free of charge. The Proxy servers in the proxy lists are distributed worldwide. In some cases a “Security rating” is provided for the Proxy servers – the user must decide how reliable this rating is.

Proxy as a Browser Plugin:

Plugins are especially available for the Firefox Browser that promise anonymization without modifying the system. One of these is (e.g.) “FoxyProxy”. Anonymized surfing via a proxy can be directly activated from within Firefox. No further settings need to be made. However, setting this up cannot be described as trivial because the functions are distributed over several windows.

Proxy solution as an independent program:

There are uncountable numbers of independent proxy programs that must be installed as normal applications. With most of them, comprehensive changes to the Browser connection parameters are necessary:

  • HTTP Proxy settings: usually “LocalHost”
  • Proxy Port

Some solutions offer automatic configuration of the necessary settings for the most common Browsers. If you wish to then again surf without a proxy, the settings must be reset or direct connections with the Browser are not longer possible.

Some examples of these programs are:

  • ProxyWay
  • Archicrypt Stealth


Local or Browser-integrated installation of Proxy solutions always carries the danger of user information being transferred (I mean this in a general sense, and not in relation to any specific program).

For this reason, you should always choose a trustworthy manufacturer.

When using Proxy servers, the danger of analysis of the data cannot be ruled out. Since encryption is not used, the data can always be read while it is underway.

Cascaded proxy solutions:

Cascaded, Mix, and Mix Cascaded Proxies are networks with several Proxy servers connected in series. The requests from a computer are then sent through several Proxy servers. Each respective Proxy server sends the request to the next Proxy server under its own name. This means that only the first Proxy server after the requesting client (your computer) knows the true origin of the request. The response follows the same path as the request.

In some cases the traffic is even encrypted.

The most well-known systems are:

  • JAP
  • TOR


JAP (Java Anon Proxy) is special client software that uses the AN.ON Mix-Cascaded Proxy network. AN.ON is an initiative of the “Independent Regional Center for Data Protection in Schleswig-Holstein” (“Unabhängiges Landeszentrum für Datenschutz in Schleswig-Holstein”).

The JAP client software was developed by the Dresden Technical University and the University of Regensburg. A commercial service called “Jondos GmbH” now also exists.

JAP uses the “JAVA” programming language and can therefore run on almost every operating system. However, to use JAP you must install the “JAVA” software from “Sun”.

If JAP is locally installed then the Browser settings must be changed to use this. The Proxy server must be set to the “LocalHost” address and the port to “4001”.

A portable version is also available.

In this context it is important to note that all operators of a JAP MIX server must provide a “Self declaration”. This states that Log files are not used and that data is not exchanged with other MIX operators.


The MIX Cascade network from TOR is a very similar solution. However, TOR relies on a decentralized network that does not require a specially selected server. TOR is also available as a locally installed version and an independent (portable) version.

Browser Plugin:

Cascaded Mix solutions are also available as Firefox Plugins that support both the JAP and TOR networks.

Independent programs:

In addition to the pure JAP or TOR clients, there are also independent solutions based on this technique.

“Torpark” is a very interesting example. The commercial version is called “XeroBank Browser” or “xB Browser” for short. The solution is based on an independent modified Firefox Browser that automatically connected to the “TOR Network” when started. The following commercial versions of the “XeroBank Browser” are available:

  • Plus version
  • Pro version
  • Premium version

The following interesting advantages are offered:

  • Preconfigured Firefox Browser with comprehensive security functions and additional functions
  • No manual configuration required
  • Portable version available (User account control warning displayed when used with restricted user access rights)


Some of the different versions are classed as “Risk tools”. This means that the user must assess the risks and these cannot be evaluated here.

Anonymization via encryption techniques:

This anonymization technique using encryption can certainly be described as the “ideal solution”. Whereas “normal” Proxy solutions also offer HTTPS encryption and Mix Cascaded Proxys encrypt internal traffic, VPN techniques use encryption for a complete end to end connection.

VPN technique:

VPN (Virtual Private Network) techniques have been developed to implement secure encrypted “Site-to-Site”, “Site-to-End” or “End-to-End” connections.

In the case of anonymization, a “tunneled” connection is created between the client and the VPN server. This connection is basically encrypted. The special possibilities of VPN are used here. This means that, in principle, every protocol can be “tunneled” and encrypted. This allows a public network to be used for transporting private (encrypted) data. The recipient can decrypt the private data and process it as they wish.

VPN is a solution conceived for security from the very beginning. It is based on a number of different protocols:

  • L2TP
  • PPTP
  • Ipsec
  • SSL
  • ViPNet
  • OpenVPN
  • CIPE
  • PPP over SSH

Anonymization over VPN:

This type of anonymization uses an encrypted connection between the client computer and a VPN server. This VPN server also functions as a Proxy server that requests the desired Internet content and sends it encrypted to the client.

The process works as follows:

  • Creation of a VPN connection to a VPN server via special client software
  • Encrypted request to the VPN server for a specific content
  • The VPN server decrypts the request and passes this on to the Proxy server
  • The Proxy server makes an unencrypted request for the content under its own name (IP address of the Proxy server)
  • The Proxy server returns the response to the VPN server
  • The VPN server encrypts the request and passes this back to the client

This means that the provider has no knowledge of the content or the requested address. The Internet service (e.g. web server) has no knowledge of the true origin of the request.

However, the operator of the VPN and Proxy system knows both the origin and the content of the request.

Software solutions:

A number of suppliers also offer this technique:

  • Steganos Internet Anonym VPN
  • CyberGhost VPN
  • Archicrypt Stealth VPN

CyberGhost VPN is currently the only supplier offering a service free of charge, but with certain limitations. The limitations relate to the volume of the data (currently 10GB/month), limited availability with waiting times, and compulsory disconnection after 6 hours.


At the very least, the Archicrypt Stealth VPN solution supports EVERY protocol (except anonymized email traffic to prevent misuse). This means that every program using the Internet is automatically encrypted. Archicrypt Stealth VPN must be installed on the computer. A quick overview of the advantages:

  • All data traffic (except email) is encrypted
  • No configuration changes needed to any programs
  • Anonymization PLUS encryption
  • Increased data protection in public networks (WLAN hotspots, Internet Cafe etc.)
  • Noticeable but not critical loss of speed
  • Very high availability
  • Easy to use


When using VPN-based anonymization services, you should note the location of the VPN server. If this lies in another country then checking is very difficult. If the VPN server is located in Germany then the provider is obliged to implement data retention measures.

Connection technologies:

From a technical point of view, a direct connection (i.e. without an anonymizer proxy) is a 3-step connection:

Client (your computer/requesting computer) –> Provider (forwarder incl. DNS name resolution) –> requested server (the requested page)

If a Proxy solution is used then this results in a 4-step connection:

Client (your computer/requesting computer) –> Provider (forwarder incl. DNS name resolution) –> Proxy-server –> requested server (the requested page)

The “Proxy server” step can consist of multiple servers (see –> “Cascaded Proxy solutions”), which are shown as a single step here for the sake of simplicity (so-called network cloud).


The following points should always be remembered:

  • 100 percent anonymity does not exist in the Internet
  • Be critical when selecting the provider – installation of applications and centralization of the data traffic provide a great deal of information to the provider
  • Be critical when choosing Proxy or anonymizer servers
  • Never make important and sensitive transactions (e.g. banking business) over an anonymization service
  • Scripts and Cookies MUST be deactivated when using anonymizer services

Frank Richter –

Have a Great (Malware-Free) Day!