{"id":1351,"date":"2021-03-08T15:17:21","date_gmt":"2021-03-08T15:17:21","guid":{"rendered":"https:\/\/www.ppcshield.io\/?post_type=kb-article&p=1351"},"modified":"2021-05-20T12:24:55","modified_gmt":"2021-05-20T11:24:55","slug":"what-are-anonymizers","status":"publish","type":"knowledge-base","link":"https:\/\/www.ppcshield.io\/knowledge-base\/popular-questions\/what-are-anonymizers\/","title":{"rendered":"What are anonymizers?"},"content":{"rendered":"
VPN, Proxy, PUB, WEB, HPD, and Tor are anonymizers.\u00a0<\/span><\/p>\n Anonymizers are tools that allow \u2014 or attempt to allow \u2014 users to make their online activity untraceable. Below you can read a short explanation of each of them:<\/span><\/p>\n Proxy<\/b> is a server acting as a gateway between you and the internet. It sits in the middle and separates the end-user from the website they browse. Meaning having the internet traffic flow through its server on the way to the requested address and back <\/span> Virtual Private Network <\/b>or better known as <\/span>VPN<\/b> allows for a secure, anonymous, and private connection between you and the internet. They are commonly used to cover a user’s ID and browsing history, gain access to restricted websites, as a workaround censorship obstacle, and more.\u00a0<\/span><\/p>\n Tor<\/b> is a browser, free and open-source that enables anonymous communication by concealing users\u2019 locations and usage. While originally the project was created to protect the general public from governmental and other private tracking enterprises, it rapidly became the home for suspicious and fraudulent users dedicated to deceiving audiences by, amongst others, committing click fraud.\u00a0<\/span><\/p>\n PPC Shield\u2019s system detects the use of anonymizers on fraudulent clicks and blocks them. This is because real and sincere users seldom have any reason to hide their identities. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":" VPN, Proxy, PUB, WEB, HPD, and Tor are anonymizers.\u00a0 Anonymizers are tools that allow \u2014 or attempt to allow \u2014 users to make their online activity untraceable. Below you can read a short explanation of each of them: Proxy is a server acting as a gateway between you and the internet. It sits in the […]<\/p>\n","protected":false},"featured_media":0,"parent":1412,"menu_order":0,"template":"","meta":[],"knowledge-base-tags":[],"class_list":["post-1351","knowledge-base","type-knowledge-base","status-publish","hentry"],"yoast_head":"\n
\n<\/span>A proxy masks your IP address and as such the true origin of the request, it is commonly used together with a VPN to enable data encryption. One of the most popular uses of a proxy is to access otherwise region-blocked websites. <\/span>
\n<\/span>There are different types of Proxy Servers:<\/span>
\n<\/span>– <\/span>Transparent<\/span><\/span> It identifies itself as a proxy to websites and provides your IP to the webserver.<\/span>
\n<\/span>– <\/span>Anonymous<\/span> <\/span>It identifies itself as a proxy but <\/span>doesn\u2019t <\/span><\/i>provide your IP to the webserver.<\/span>
\n<\/span>– <\/span>Distorting<\/span><\/span> It identifies itself as a proxy and provides a <\/span>false<\/span><\/i> IP to the webserver.<\/span><\/p>\n\n