How does Google know I'm using a proxy?

biks

Power Member
Joined
Oct 28, 2008
Messages
719
Reaction score
388
So I've got Tor running and I'm using it to bookmark some sites. When I tried doing a search with Google with Tor enabled, it gives me a message along the lines of "what's going on?"

How does Google know that I'm using Tor?

What should I be using if I don't want this to happen?
 
Most of the main Tor gateways have been identified, so its not quite as effective now as it was before (and is very slow most of the time). Also, you may have just picked up an IP that someone just used for spamming a google service anything for minutes to hours before you used it.
 
yes, google is almost impossible to beat.
pls notice i used word 'almost'.
 
TOR is way too slow. It's better to find some proxies to use instead or maybe try some software like ProxyShell hide IP.
 
never heard of this one, is it free a0rta ?

Unfortuneatly not free. :( (they have a tiral ware but it doesn't allow so much traffic)

There are (have been) some warez to pick up on various sites but I haven't seen any for the latest update, working as it should. And they also changed some server stuff so earlier versions doesn't seems to work :(

This program have workd just fine for me before and I have never had any problem with it. A lot faster then using TOR and I don't get all the headache by trying to use free proxis and I think it's a good alternative to private proxies (though... Private proxies is to prefere if one just want to pay for them).

Still.. they have some interesting services and the price isn't so high.

ProxyShell Hide IP Standard $39.95 (USD)
ProxyShell Advanced Proxy Service - 1 Year Subscription $34.95 (USD)

But I guess one can find copies for the stadard version soon. Just have to give the crackers some time to work it out ;)
 
Last edited:
Try the VPNs - a lot faster than proxies
 
Yeah Tor is slow as shit I dont find it very useful for even web browsing
 
it's because Google has the finest, intelligent guys around. plus they have the money to do as they please.
 
if you go to: showmyip.com/?version=full and you have tor on, you will be caught as using tor network, tor is almost the easiest to be caught now, find a good private socks5 or proxies or my recommendation is to use a VPN
 
Ups, too quick, you are referring on tor. Yep, the number of tor exit nodes is small, on the tor-homepage you can get a list of them. I also used tor and it was just a waste of time; additionally tor is so f*ucking slow, no benefit at all. But don't forget my last post when switching to normal proxies :)
 
USE a normal proxy from any website a good one stealth.us

OK, I found stealth.net. That doesn't look like they do IP cloaking.
HTML:
www.stealth.us
seems to be down. What am I looking for?
 
it's because Google has the finest, intelligent guys around. plus they have the money to do as they please.

QFT.


Just try to find the most obscure proxy sites you can--weird bottom-of-the-list ones. The less people in general know about them, the less likely Google is to know about them, haha. Some might be slow, but as long as it's hidden... I also second using VPN, though that's a bit more expensive.
 
Cloakfish (see the link in my Sig) is commercial Tor, uses Tor nodes but uses them in a much faster way optimized for SEO usage.

Some of the identities get that google message, it mainly means that google has a reason to believe you are a bot.
Tor is used by a lot of people from countries like China, Iran, Burma, Pakistan, Saudis, etc. they all use google to browse too.
Tor uses the static tor nodes for most connections because Tor distributes nodes evenly based on the bandwidth of the nodes.
So you usually got one of those nodes and so it's even more likely that google wonders if you'r automatically browsing it with some software.

Just enter the captcha and continue working ;)


Edit, PS:
you are on the right track I think.
Normal proxies don't give real anonymity, if you use the right tor nodes you look like a normal internet user to the webserver.
This is the best possible result for SEO. Cloak your identity to look like someone else AND be highly anonymous if your violating rights or laws of course.
 
Last edited:
Cloakfish might be a good tool, I do not know but just want to state some facts:

if you use tor-services you still have the problem of DNS-leaking:

your http traffic runs over tor-nodes, your dns requests are answered locally.

Not sure, what happens, when you use socks-proxies, I assume the same happens and you have to do additional things to prevent that.

How do you handle this, justone?

And commercial or not, the number of exit nodes is very limited. So If you use the tor network, you will use the well-known exit nodes which already experienced much abuse.

And: velocity? Do you connect to many tor-nodes at once for multiple connections? But if so, I doubt, that a single connection can be boosted, no way to cheat the tcp-protocoll!? But... I don't know how fast your methodology is, maybe you could explain?


What I do for anonymity - and certainly, I have no identities, this is an interesting feature of cloakfish!

I use VPN in an foreign country and do not care to much what could happen. Now I additionally use proxies and have double-safety. The VPN makes it possible that your local provider does not know anything about your activities - ALL traffic even DNS runs over the VPN. And the traffic is encrypted! Using furthermore proxies prevents that your VPN-Provider gets angry. Well this is just my use-case, for CL-promoting for instance, cloakfish might be a good tool.
 
A VPN, even in another country is not really helping for high anonymity.
Depending on the country a chained proxy like you described it is of course helping a lot, but in all those scenarios it depends on the interest of a damaged company or the interest of the authorities to track you back. If they really want you they will catch you in such a case.

I'll try to answer your questions, I see you are already pretty experienced with Tor:
DNS leaking is solved in the Howto: http://www.cloakfish.com/?tab=howto#howto_firefox-dns-anonymity
In the Cloakfish options you can select DNS,port 53, as required then you can use this method to tunnel DNS.
This is the easiest way (for browsers), if you need it for other tools I'd happily help you to tunnel your DNS requests too. There are many other ways to handle it.
In general DNS anonymity is no threat to most people, DNS only contains hostname,domain and no path or data so you can learn very little through it. (of course you can do a lot of shit if you alter the dns replies on the server, but that would be evil ;)

Cloakfish offers a realtime list of working nodes, about 350-400 at the moment this changes a bit all the time, nodes come and go.
My statistics show that you get about 15,000 different IPs/Identities each month, that's more than almost everyone requires.
If you need more than 15,000 per month then you probably don't need high anonymity for much of the actions, if you still need high anonymity you could use a fast Cloakfish Identity (or even Tor) chained to a large proxylist.

There was a lot of learning involved, Tor is a really complicate project. Cloakfish does a few tricks to increase speed.
As example per default you use only 2 proxies in row, Tor is fixed to 3 and can not be changed. There are also many other improvements and changes to increase speed.
Also the process of circuitfinding was improved and is general faster as a part of the work is done on the servers.
The next version might already include a 1 proxy feature that's already working in alpha stage.
The Cloakfish servers remove bad and very slow nodes.

Cloakfish is always faster than Tor but in the end you are limited by the exit node.
For SEO the best nodes look like a real internet user, those nodes are frequently available but also rarely faster than 100kb/sec (usually 25-60).
So it's up to the user, choose a faster node or choose a more "cloaky" node.

hope that helped to clear it a bit up
 
I check if my proxies are transparent here:

Code:
http://www.ipshow.com

It warns you when you're using a transparent proxy and shows you your leaked IP. If you use a service like google translate and visit that website you'll notice that it shows google's IP but it warns you on a box with your real IP. If you visit that website with your proxy on and it doesn't leak your true IP it means you're safe on that department. So far I've had no problems when I check my IP like that.
 
Back
Top