HTTP protocol, on which the WWW is based, allows specific information to flow back from the user to the web-site. OS and some web-browsers also leak some personal information of their users to the web-site. These may include the IP address of the computer the user is using, the previous web-site visited by the user, the information the user has copied onto his/her computer's clipboard, the time zone the user is in, the user's host-computer type, and the kind of OS and software installed by the user.
Using the above information, any web site in the world can track your movements through its pages and monitor your reading interests. If someone has your IP address, your machine can be attacked in various ways. Hackers can automatically exploit security holes in your system using some not-very-complex, ready-made, free hacking programs. If you have ever copied the contents of a sensitive email, a name, a phone number, addresses, or even credit card number onto your clipboard, it may be possible that your information has already been leaked to others. They can be read by any website as long as they want to. In many cases a user will use only one email address to establish multiple accounts on different website's, which can also reveal much about the user's identity, too.
Besides that, Depending on the policies of the Internet resource, you might not be able to get access to the information you need. According to your IP address, you may be prevented from accessing a specific set of web sites in some locations.
But anonymous proxy servers ( from proxy list ) - if they are anonymous - don't transfer any information about the IP-address of the client, and thus effectively hide the information about you and your surfing interests. Besides that, some proxy servers ( from proxy list ) can also hide the very fact that you are surfing through a proxy servers ( from proxy list ) ! |