Proxies

Post any eMule-related questions and FAQ's here.
User avatar
idler
Posts: 1107
Likes:
Joined: Sat Apr 01, 2006 1:00 am

Proxies

Post by idler »   0 likes

Amadeus wrote:
ghost wrote:i never would trust a service where you have to subscribe and pay....
Best way's probably the old fashion way for finding proxies in foreign countries. Like China or other countries who dislike westerners. Western countries would not subpoena Yemen for example. Unfortunately, downloads take 5 times longer. :wall
Worried about trouble with authorities? Of course, you can use proxies not only for the http protocol, but for ed2k, too... Just put in the proxy into your eMule client under "Options">"proxy".

proxies:
http://www.samair.ru/proxy/
http://www.proxy4free.com/page1.html

checkers:
http://www.stilllistener.com/checkpoint1/
http://tools.rosinstrument.com/proxy/

Some ss basics:
http://darkfaqs.boom.ru/SurfSafe.htm

Some tools:
http://www.all-nettools.com/toolbox/network-tools.htm :icon_secret
Debaser

Re: Proxies

Post by Debaser »   0 likes

Not having much knowledge of Proxys and what they are exactly, I have a couple of questions to ask……….

My first question would be: Can we be 100% sure that those servers listed are safe, and aren’t simply eavesdropping on us?

Secondly, don’t our ISP’s and god knows who else already have plenty of info on the likes of us, before we start using proxys?

Authorities can find out about individuals by simply analysing a persons rip, and no amount of HDD cleaning will hide evidence (short of destroying the disk) from forensics officers.

With all of the above in mind, is it really worth all the extra effort when we are all pretty much doomed already?
User avatar
idler
Posts: 1107
Likes:
Joined: Sat Apr 01, 2006 1:00 am

Re: Proxies

Post by idler »   0 likes

1. Proxy server lists normally can be sorted by country, quality, last time checked etc. You can run a proxy checker for yourself and make an arin-whois query; this way, you can avoid the proxy of "Air America" in Langley VA and connect to the proxy of, let's say, the university of Teheran.

2. If LEA asks your ISP "What the hell did that guy Debaser do?" it gets the reply "He had a connection to the university of Teheran for 24 hrs and downloaded 2 GB of data:". As you may imagine, LEA is not going to ask the Iranians to whom your connection really went.

If you are downloading with eMule from a trap client - suppose there are trap clients, the movie industry spends a lot of anti-prcy money - it can only say that the chunks were downdloaded by the university of Teheran - game over.

3. Even normal overwriting with 0 and 1 makes a HD unreadable. You can do it 4 times (that's standard for the eraser tools of pgp, Kremlin or Steganos), or even 7 times (requested by the US Army, but they are a bit paranoid), but it's not necessary. LEA was checking my PC for 18 month and found nothing.

To make sure all the metadata windows is collecting and storing somewhere like name of file, size, path etc. will be deleted, you better use a good program like the actual Steganos Security Suite. You know where to get it.
User avatar
ghost
Site Admin
Posts: 11384
Likes:
Joined: Sun Mar 07, 2004 1:00 am

Re: Proxies

Post by ghost »   0 likes

Well explained idler!

What do you think about Tor? http://www.torproject.org/index.html.en
User avatar
idler
Posts: 1107
Likes:
Joined: Sat Apr 01, 2006 1:00 am

Re: Proxies

Post by idler »   0 likes

I'm trying to keep it simple... lol
Chip 29/08/08 wrote:Einsteiger sind aber sicher schnell überfordert, wenn es darum geht, Messenger und Tauschbörsen über das Tor-Netzwerk laufen zu lassen.
http://www.chip.de/artikel/Vergleichste ... 61744.html :think
User avatar
ghost
Site Admin
Posts: 11384
Likes:
Joined: Sun Mar 07, 2004 1:00 am

Re: Proxies

Post by ghost »   0 likes

How can you download anonymous with emule????

It is peer to peer. You can connect to ed2k servers via a proxy server, but not to the computers where you downlaod a file.
User avatar
idler
Posts: 1107
Likes:
Joined: Sat Apr 01, 2006 1:00 am

Re: Proxies

Post by idler »   0 likes

Hä? :eyecrazy
Gebrauchsanweisung wrote:Das SOCKS Protokoll ist anwendungsunabhängig und wird eingesetzt falls Verbindung zwischen zwei Computern hergestellt werden soll, ohne dass direkt die jeweilige IP erreichbar ist. Die Versionen 4 und 4a sind allerdings nur in der Lage das TCP Protokoll weiterzuleiten, nicht aber UDP. Kommt ein solcher Proxy zum Einsatz muss in Einstellungen -> Verbindungen der UDP Port über die entsprechende Schaltfläche deaktiviert werden.
...deshalb kannst Du hinter UDP "deaktiviert" ankreuzen...
well, you may say that it's no peer to peer anymore...lol
Debaser

Re: Proxies

Post by Debaser »   0 likes

Thanks for the info idler.

Ill try and get my head around all of this and when I get a spare moment, do something about it.
User avatar
idler
Posts: 1107
Likes:
Joined: Sat Apr 01, 2006 1:00 am

Re: Proxies

Post by idler »   0 likes

@Debaser
Be aware that there probably will be negative results for your ul/dl speed. Good proxies - usually from South Korea or Latin America and Brazil - normally last only for 2 or 3 days. Russian proxies may last longer cause the admins there don't care, but are usually slooow...

So, if you use a proxy for eMule, be sure you are sharing illegal content...lol
FLL
Posts: 2191
Likes:
Joined: Mon Aug 28, 2006 1:00 am

Re: Proxies

Post by FLL »   0 likes

One reason I mentioned paid anonymizing services (anonymizer.com, relaaks.com) in the other thread is that yes, they are services which you can't completely trust, but at least everything you do when connected is encrypted so that your ISP can't see exactly what you are doing. A normal proxy hides your IP Address from the destination you are connected to, but your local network and ISP still sees your traffic.

Though there is certainly great benefit in hiding your ultimate destination from your ISP, it's not everything, as in the US at least it's known that the FBI has a great deal of control over ISPs and has boxes installed at ISPs which sniff their traffic. Even though the paid anonymizing services have their own traffic being sniffed, if the service is in a different country it is inherently safer since they are unlikely to be as interested in you and it would be a lot more trouble/expense for them if they did get interested in you.

If you use a shared wireless point to access the net, then paid anonymizing services are even more useful, since it's relatively easy for someone in your vicinity to sniff your traffic and that is potentially a much greater threat than governments of foreign counties.

Ultimately you are never completely safe and should never act like you are. By the way, relakks.com and the new service the Pirate Party in Sweden is planning may not be as safe from now on, since a new law just went into effect in Sweden, and apparantly traffic for the entire country dropped 33% for the first day as p2p downloaders became scared.
Post Reply