Anonymous proxy

There are many reasons for using anonymizers, such as minimizing risk, prevention of identity theft, or protecting search histories from public disclosure.

Furthermore, as information itself about anonymizer websites are banned in those countries, users are wary that they may be falling into a government-set trap.

For example, large news outlets such as CNN target the viewers according to region and give different information to different populations.

Web browsers, FTP and IRC clients often support SOCKS for example, unlike telnet.

Chaining anonymous proxies can make traffic analysis far more complex and costly by requiring the eavesdropper to be able to monitor different parts of the Internet.

Tor is not merely a proxy chain, but an onion router, which means that routing information (as well as message content) is encrypted in such a way as to prevent linking the origin and destination.

Like all anonymity networks, Tor cannot end-to-end encrypt messages destined for the public internet;[14] it must be arranged between the sender and recipient.

Tor's onion service protocol does, however, provide end-to-end encryption, along with the ability to anonymize servers, making them more censorship-resistant.

As all traffic always stays within the I2P network, a routing user's I2P can remain end-to-end encrypted and will never show on public websites' logs.